This is an exploit for HoleyBeep.
To use it, place any command you want root to execute in /tmp/x.
$ cat /tmp/x
echo PWNED $(whoami)| - (UIImage *)dynamicImage | |
| { | |
| UITraitCollection *const baseTraitCollection = /* an existing trait collection */; | |
| UITraitCollection *const lightTraitCollection = [UITraitCollection traitCollectionWithTraitsFromCollections:@[baseTraitCollection, [UITraitCollection traitCollectionWithUserInterfaceStyle:UIUserInterfaceStyleLight]]]; | |
| UITraitCollection *const purelyDarkTraitCollection = [UITraitCollection traitCollectionWithUserInterfaceStyle:UIUserInterfaceStyleDark]; | |
| UITraitCollection *const darkTraitCollection = [UITraitCollection traitCollectionWithTraitsFromCollections:@[baseTraitCollection, purelyDarkTraitCollection]]; | |
| __block UIImage *lightImage; | |
| [lightTraitCollection performAsCurrentTraitCollection:^{ | |
| lightImage = /* draw image */; |
| // based on ian beer's code | |
| // just use https://github.com/bazad/x18-leak , it's way cleaner | |
| // by stek29 | |
| // see bazad's writeup: http://bazad.github.io/2018/04/kernel-pointer-crash-log-ios | |
| #if 0 | |
| From https://gist.github.com/stek29/e68e9eae382b975093252d6117b6b501 | |
| Finding Lel0_synchronous_vector_64_long: |
| #!/bin/bash | |
| ITERATION=1 | |
| EXTENSION="mp4" | |
| FILENAME="$HOME/Desktop/Simulator Recording.$EXTENSION" | |
| while [ -e "$FILENAME" ] | |
| do | |
| ITERATION=$((ITERATION+1)) | |
| FILENAME="$HOME/Desktop/Simulator Recording $ITERATION.$EXTENSION" |
| 00:0A:F5:66:C2:A4 | |
| 04:B1:67:B5:87:F1 | |
| 28:ED:6A:87:D4:A6 | |
| 38:F2:3E:8F:69:20 | |
| 58:48:22:45:6B:FC | |
| 80:EA:96:4A:02:C4 | |
| 8C:8E:F2:7C:FD:90 | |
| 98:00:C6:33:B3:66 | |
| B0:E5:ED:9A:8B:9F | |
| D8:5B:2A:B1:1E:A3 |
| public class Channel<Value> { | |
| private class Subscription { | |
| weak var object: AnyObject? | |
| private let notifyBlock: (Value) -> Void | |
| private let queue: DispatchQueue | |
| var isValid: Bool { | |
| return object != nil |
| admin account info" filetype:log | |
| !Host=*.* intext:enc_UserPassword=* ext:pcf | |
| "# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd | |
| "AutoCreate=TRUE password=*" | |
| "http://*:*@www” domainname | |
| "index of/" "ws_ftp.ini" "parent directory" | |
| "liveice configuration file" ext:cfg -site:sourceforge.net | |
| "parent directory" +proftpdpasswd | |
| Duclassified" -site:duware.com "DUware All Rights reserved" | |
| duclassmate" -site:duware.com |
| function logColor(color, args) { | |
| console.log(`%c ${args.join(' ')}`, `color: ${color}`); | |
| } | |
| const log = { | |
| aliceblue: (...args) => { logColor('aliceblue', args)}, | |
| antiquewhite: (...args) => { logColor('antiquewhite', args)}, | |
| aqua: (...args) => { logColor('aqua', args)}, | |
| aquamarine: (...args) => { logColor('aquamarine', args)}, | |
| azure: (...args) => { logColor('azure', args)}, |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <stdint.h> | |
| #ifdef _MSC_VER | |
| #include <intrin.h> /* for rdtscp and clflush */ | |
| #pragma optimize("gt",on) | |
| #else | |
| #include <x86intrin.h> /* for rdtscp and clflush */ | |
| #endif |
| # THIS IS PROVIDED WITHOUT ANY WARRANTY EXPLICIT OR IMPLICIT | |
| # THE AUTHORS ARE NOT RESPONSIBLE FOR ANY SECURITY ISSUES OR FINANCIAL LOSSES | |
| # Installing requirements: pip install python-bittrex | |
| # Then, change the next two lines with your Bittrex API info (with limit order & view info access) | |
| BITTREX_PUBLIC = "INSERT BITTREX PUBLIC HERE" | |
| BITTREX_SECRET = "INSERT BITTREX SECRET HERE" | |
| # Finally, see the bottom of this file | |
| # (do not edit below this point) |