xModders

LibSpy.src

Jan 20th, 2025 (edited)
25
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.35 KB | Gaming | 0 0
  1. Parser = function(text)
  2.  
  3. text = text.split("\n");
  4. vuln = [];
  5.  
  6. for line in text
  7.  
  8. if line.indexOf("<b>") then
  9.  
  10. words = line.split(" ");
  11.  
  12. for item in words
  13.  
  14. cue = "";
  15. target = "";
  16. special_char = false;
  17.  
  18. for char in item
  19.  
  20. if char == "<" then
  21.  
  22. special_char = true;
  23.  
  24. end if
  25.  
  26. if special_char then
  27.  
  28. cue = cue + char;
  29.  
  30. if char == ">" then
  31.  
  32. special_char = false;
  33.  
  34. end if
  35.  
  36. else
  37.  
  38. if char != "." then
  39.  
  40. target = target + char;
  41.  
  42. end if
  43.  
  44. if cue.len > 3 then
  45.  
  46. vuln.push(target);
  47.  
  48. end if
  49.  
  50. end if
  51.  
  52. end for
  53.  
  54. end for
  55.  
  56. end if
  57.  
  58. end for
  59.  
  60. return vuln;
  61.  
  62. end function
  63.  
  64. LibSpy = function(x)
  65.  
  66. exploits = []
  67. metaxploit = include_lib("/lib/metaxploit.so");
  68.  
  69. if typeof(x) == "MetaLib" then
  70.  
  71. memory_zones = metaxploit.scan(x);
  72.  
  73. for address in memory_zones
  74.  
  75. unsafe_string = {"address":address,"buffer":"null"};
  76.  
  77. data = metaxploit.scan_address(x,address);
  78. unsafe_string.buffer = Parser(data);
  79. exploits.push(unsafe_string);
  80.  
  81. end for
  82.  
  83. else
  84.  
  85. return "The given object is not a Lib.";
  86.  
  87. end if
  88.  
  89. return exploits;
  90.  
  91. end function
Tags: Script
Advertisement
Add Comment
Please, Sign In to add comment