unfuck
thefuck
Our great sponsors
unfuck | thefuck | |
---|---|---|
6 | 305 | |
196 | 82,804 | |
- | - | |
6.0 | 4.8 | |
6 months ago | 2 months ago | |
Rust | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
unfuck
-
Show HN: A new LLVM optimization pass that aggressively reduces WebAssembly size
This is sweet! This is actually a very similar approach to how I deobfuscate Python bytecode: https://github.com/landaire/unfuck/blob/bfa164b4e261deffeb37...
My code is pretty messy, but I take the same exact approach of taking known function parameters, interpreting the instructions, and removing any condition and the instructions which built its arguments if it evaluates to a constant value. Even called it partial execution as well :p
- GitHub - landaire/unfuck: Python 2.7 bytecode d̶e̶o̶b̶f̶u̶s̶c̶a̶t̶o̶r unfucker
-
Unfuck: A utility for deobfuscating Python 2.7 bytecode
I haven't heard of this tool before, but I don't think it would work for obfuscated code. Check out the graph image on my wiki [1]. While this image doesn't show the exact scenario, imagine that the first instruction is a `JUMP_ABSOLUTE 100` and the rest of the instructions between offset [3,100) are just garbage or invalid.
A naive disassembler (like the `dis` module in python) interprets the bytecode linearly -- i.e. one instruction after another. Rizin's diassembler [2] seems to take the same approach. The way I do disassembly is to only disassemble code paths that are potentially executed by queueing non-conditional jumps, both targets of a conditional jump, and the next instruction when the current instruction is non-jumping instruction.
[1] https://github.com/landaire/unfuck/wiki/Obfuscation-Tricks
- unfuck - a deobfuscator for Python 2.7 bytecode
thefuck
-
Control Linux based distros using hand gestures using OpenCV, GTK, Mediapipe
Are you by chance interested in a command named after the four-letter word, which automatically fixes and reruns the last command: https://github.com/nvbn/thefuck
- Thefuck: Correct errors in previous console commands
-
thefuck VS oh-crab - a user suggested alternative
2 projects | 5 Jan 2024
- Milyen hasznos Github repokat ismertek?
-
Code and Chill Guide 2023
With a good terminal, you can work 2-4 times faster. This will save time and reduced your errors. You can also use fuck (just like how you swear most of the time) to correct errors easily.
- Thefuck: Correct Your Previous Console Command
-
Proof of Concept: Local LLM to execute terminal comands (Here GPT-2)
Now I want a thefuck implementation via uncensored LLMs.
- better than admitting I'm too too lazy to correct the command
-
How to start a Go project in 2023
>spellcheck on commands
I prefer to just type "fuck":
https://github.com/nvbn/thefuck
-
What's everyone working on this week (21/2023)?
I am starting to learn Rust and I am starting to implement the fuck CLI tool in Rust. Do you think this is a good use of my learning time?
What are some alternatives?
rizin - UNIX-like reverse engineering framework and command-line toolset.
ohmyzsh - 🙃 A delightful community-driven (with 2,300+ contributors) framework for managing your zsh configuration. Includes 300+ optional plugins (rails, git, macOS, hub, docker, homebrew, node, php, python, etc), 140+ themes to spice up your morning, and an auto-update tool so that makes it easy to keep up with the latest updates from the community.
cwe_checker - cwe_checker finds vulnerable patterns in binary executables
httpie - 🥧 HTTPie CLI — modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more.
debugoff - Linux anti-debugging and anti-analysis rust library
fish-shell - The user-friendly command line shell.
pocket - Mixed Boolean Arithmetic Expression Obfuscator
howdoi - instant coding answers via the command line
SkidSuite - A collection of java reverse engineering tools and informational links
aws-cli - Universal Command Line Interface for Amazon Web Services
binocle - a graphical tool to visualize binary data
poe-archnemesis-scanner - Tool for Path of Exile game to automatically scan Archemesis inventory and display related information