code

How to create sample codes for Video 3D on Android

  In Android, it is very easy to create an app that can play video clips; it is also easy to create a game app with 3D graphic surface. But it is not straightforward to create an app that can play...




code

BS6 TVS Apache RTR 200 4V decoded in pictures: Now better looking with more features!

We have recently ridden the new 2020 TVS Apache RTR 200 4V on a racetrack and came back impressed. Here is why!




code

Can You Decode Mumbai Police's Lockdown Mandate? Twitter Is Divided

Mumbai Police drew inspiration from a topic that has been trending all over social media - the name of Elon Musk's newborn baby boy - to devise a brainteaser with an important message.




code

Verilog Code to Custom IC Layout generation

Hello everyone,

I am Vinay and I am currently developing some digital circuits for my chip design for my master's thesis at University at Buffalo.

I am fairly very new to Verilog and I don't seem to follow some of the things others find very easy.

Following are the things that I want to do to which I have no clue:

1. Develop certain arithmetic functionality in Verilog

2. Generate netlist for the verilog code

3. Feed the netlist file to Cadence encounter to be able to generate Digital Circuits' layout for my chip

I can use Cadence Virtuoso and Encounter for this but I don't know the exact procedure to get this done.

Could someone please describe the detailed process for doing the things mentioned above.

Thank you.




code

Viewing RTL Code Coverage reports with XCELIUM

Hi,

There was tool available with INCISIV called imc to view the coverage reports.

The question is: How can we view the code coverage reports generated with XCELIUM? I think imc is not available with XCELIUM?

Thanks in advance.




code

Skill code to disable all callbacks

Can anybody assist with a Skill code /function to disable all callbacks




code

Skill code to Calculating PCB Real-estate usage using placement boundaries and package keep ins

Other tools allow a sanity check of placement density vs available board space.  There is an older post "Skill code to evaluate all components area (Accumulative Place bound area)"  (9 years ago) that has a couple of examples that no longer work or expired.

This would be useful to provide feedback to schismatic and project managers regarding the component density on the PCB and how it will affect the routing abilities.  Thermal considerations can be evaluated as well 

Has anyone attempted this or still being done externally in spread sheets?




code

Breaking a clineseg into multiple segments with SKILL code

Hello All,

May I know if there is a way to breakup a selected clinesegment into a few clinesegments by just using SKILL code

Thanks All




code

Welcome! Please use this forum to upload your code

Please include a brief summary of how to use it.




code

e-code: Macro example code for Team Specman blog post

Hi everybody,

 

The attached package is a tiny code example with a demo for an upcoming Team Specman blog post about writing macros.

 

Hilmar




code

ctags for e code, Vim compatible

In a nutshell, tags allows you to navigate through program code distributed over multiple files effectively. e.g if you see a function call or a struct in e-code and want to "jump" to the definition (which may be in a different file) then you just hit CTRL+] in Vim! Pressing CTRL+t will take you back where you came from. Check out http://vim.wikia.com/wiki/Browsing_programs_with_tags#Using_tags if you want to learn more about how to use tags with Vim.

This utility can generate tags file for your e files. It can either walk through e import order, a directory recursively or all directories on SPECMAN_PATH recursively! The tags file will have tags for struct, unit, types, events, defines, fields, variables, etc.

For help and some examples, just run ctags4e -help.

 

 




code

Adobe Flash Player Type Confusion Remote Code Execution

This Metasploit module exploits a type confusion vulnerability found in the ActiveX component of Adobe Flash Player. This vulnerability was found exploited in the wild in November 2013. This Metasploit module has been tested successfully on IE 6 to IE 10 with Flash 11.7, 11.8 and 11.9 prior to 11.9.900.170 over Windows XP SP3 and Windows 7 SP1.




code

Adobe Flash Player Integer Underflow Remote Code Execution

This Metasploit module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 12.0.0.43. By supplying a specially crafted swf file it is possible to trigger an integer underflow in several avm2 instructions, which can be turned into remote code execution under the context of the user, as exploited in the wild in February 2014. This Metasploit module has been tested successfully with Adobe Flash Player 11.7.700.202 on Windows XP SP3, Windows 7 SP1 and Adobe Flash Player 11.3.372.94 on Windows 8 even when it includes rop chains for several Flash 11 versions, as exploited in the wild.




code

Advantech WebAccess 8.0 / 3.4.3 Code Execution

Using Advantech WebAccess SCADA Software and attacker can remotely manage industrial control systems devices like RTU's, generators, motors, etc. Attackers can execute code remotely by passing a maliciously crafted string to ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX.




code

UCanCode Remote Code Execution / Denial Of Service

UCanCode has active-x vulnerabilities which allow for remote code execution and denial of service attacks.




code

BarcodeWiz ActiveX Control Buffer Overflow

BarcodeWiz ActiveX Control versions prior to 6.7 suffers from a buffer overflow vulnerability.




code

Adobe Flash Active-X 28.0.0.137 Remote Code Execution

Adobe Flash Active-X plugin version 28.0.0.137 remote code execution proof of concept exploit.




code

Apache Hadoop Spins Cracking Code Injection Vulnerability YARN









code

Windows OLE Automation Array Remote Code Execution

This Metasploit module exploits the Windows OLE automation array remote code execution vulnerability. The vulnerability exists in Internet Explorer 3.0 until version 11 within Windows 95 up to Windows 10.




code

OpenBSD OpenSMTPD Privilege Escalation / Code Execution

Qualys discovered a vulnerability in OpenSMTPD, OpenBSD's mail server. This vulnerability is exploitable since May 2018 (commit a8e222352f, "switch smtpd to new grammar") and allows an attacker to execute arbitrary shell commands, as root.




code

New RFID Tag Could Mean The End Of Bar Codes




code

Microsoft Windows SMB 3.1.1 Remote Code Execution

Microsoft Windows SMB version 3.1.1 suffers from a code execution vulnerability.




code

CodeWarrior 0.3

CodeWarrior is a manual code and static analysis tool. It has many modules, one for each common language like PHP, ASP, Ruby, C/C++, Java and Javascript. Each module has rules in raw text with parameters like description, type, reference, relevance and match (regex to detect pattern). You can also create your own rules.




code

LW-N605R Remote Code Execution

LW-N605R devices allow remote code execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.




code

Telerik UI Remote Code Execution

The Telerik UI for ASP.NET AJAX insecurely deserializes JSON objects in a manner that results in arbitrary remote code execution on the software's underlying host.




code

Adobe Fixes Critical Code Execution Flaws In Latest Patch Update




code

Adobe Patch Update Squashes Critical Code Execution Bugs




code

Adobe Releases Patch For Critical Code Execution Vulnerability




code

Apache Shiro 1.2.4 Remote Code Execution

This Metasploit module exploits a vulnerability that allows remote attackers to execute arbitrary code on vulnerable installations of Apache Shiro version 1.2.4.




code

Linux/x86 Reverse Shell NULL Free 127.0.0.1:4444 Shellcode

91 bytes small Linux/x86 reverse shell NULL free 127.0.0.1:4444 shellcode.




code

Linux/x86 execve /bin/sh Shellcode

25 bytes small Linux/x86 execve /bin/sh shellcode.




code

Linux/x86 execve(/bin/sh) Socket Reuse Shellcode

42 bytes small Linux/x86 execve(/bin/sh) socket reuse shellcode.




code

Primefaces 5.x Remote Code Execution

This Metasploit module exploits an expression language remote code execution flaw in the Primefaces JSF framework. Primefaces versions prior to 5.2.21, 5.3.8 or 6.0 are vulnerable to a padding oracle attack, due to the use of weak crypto and default encryption password and salt.




code

Linux/x86 (NOT|ROT+8 Encoded) execve(/bin/sh) Null Free Shellcode

47 bytes small Linux/x86 (NOT|ROT+8 Encoded) execve(/bin/sh) null free shellcode.




code

Linux/x86 Encoder / Decoder Shellcode

117 bytes small Linux/x86 encoding of random bytes + XOR/SUB/NOT/ROR and also decodes ROL/NOT/ADD/XOR execve(/bin/sh) shellcode.




code

Linux x86_x64 sys_creat("ajit", 0755) Shellcode

53 bytes small Linux/x86_x64 sys_creat("ajit", 0755) shellcode.




code

Linux/x86 Execve() Alphanumeric Shellcode

66 bytes small Linux/x86 Execve() alphanumeric shellcode.




code

Linux/x86 Random Bytes Encoder + XOR/SUB/NOT/ROR execve(/bin/sh) Shellcode

114 bytes small Linux/x86 random bytes encoder and XOR/SUB/NOT/ROR execve(/bin/sh) shellcode.




code

Windows/x86 Dynamic Bind Shell / Null-Free Shellcode

571 bytes small Microsoft Windows x86 dynamic bind shell and null-free shellcode.




code

Dynamic Null-Free PopCalc Shellcode

223 bytes small dynamic, null-free popcalc shellcode.




code

Windows/x86 Null Free WinExec Calc.exe Shellcode

195 bytes small Windows/x86 null-free WinExec Calc.exe shellcode.




code

Dynamic MessageBoxA||W PEB And Import Table Method Shellcode

232 bytes small Dynamic MessageBoxA||W PEB and Import Table Method shellcode.




code

WinExec Add-Admin Dynamic Null-Free Shellcode

210 bytes small WinExec add-admin dynamic null-free shellcode.




code

Linux/x86 Reboot Polymorphic Shellcode

26 bytes small Linux/x86 reboot polymorphic shellcode.




code

Linux/x86 Egghunter / Null-Free Shellcode

33 bytes small Linux/x86 egghunter null-free shellcode.