View securityfest-bluepill.py
#!/usr/bin/python
complete = "g1Mm3Th3r3D1"
magic = "Linux version 4.17.0-rc4+ (likvidera@ubuntu) (gcc version 7.2.0 (Ubuntu 7.2.0-8ubuntu3.2)) #9 Sat May 12 12:57:01 PDT 2018"
# orig = "40369e8c78b46122a4e813228ae8ee6e"
# orig = "e4a75afe114e4483a46aaa20fe4e6ead"
orig = "8c3749214f4a9131ebc67e6c7a86d162"
# begin
View securityfest-mrreagan.py
#!/usr/bin/python
import itertools
import base64
a = ["c2N0ZnszbD","VsNTNfdzRz","bjN0MWNfcH","X2Y0azN9Cg","NjdHIwbTRn"]
for x in itertools.permutations(a):
s = "".join(x)
print s
View rctf-babyre-solve.py
#!/usr/bin/python
import pwn
pwn.context.log_level = "error"
key = {}
for c in "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789_-{}":
p = pwn.process("./babyre")
View rctf-numbers-solver.py
#!/usr/bin/python
import pwn
import hashlib
import re
pwn.context.log_level = 'error'
import sys
import itertools
import collections
View rctf-cpushop-solve.py
#!/usr/bin/python
import pwn
import sys
from base64 import b16encode, b16decode
from hashpumpy import hashpump
from urlparse import parse_qsl
# for some easy last points on RCTF
View rctf-cats-dockerfile
FROM ubuntu:latest
ENV TZ=Asia/Shanghai
RUN ln -snf /usr/share/zoneinfo/$TZ /etc/localtime && echo $TZ > /etc/timezone
RUN apt-get update && apt-get install -y php python3 nodejs ruby && mkdir /app
WORKDIR /app
# build: docker build -t rctf_cats .
# judge: docker run -it --rm --network none -v /tmp/yourCatFood:/app/food:ro rctf_cats bash -c "timeout 5 diff -Z <(cat food) <(eachCatNameYouProvided food)"
View defcon-disassembler-elfcrumble.py
#!/usr/bin/python
from capstone import *
for i in range(1,9):
f = open("pieces/fragment_%d.dat" % i)
md = Cs(CS_ARCH_X86,CS_MODE_32)
n = 0
for x in md.disasm(f.read(),0x1000):
if n > 5:
View plaidctf-pupper.py
#!/usr/bin/python
import socket
import time
f = open("examples/fuck.dog")
data = f.read()
f.close()
data += " " * (2048 - len(data))
View ms-brutelogin.py
#!/usr/bin/python
import hashlib
import requests
import random
import string
import json
import sys
# f = open(sys.argv[1])
View ms-brute.py
#!/usr/bin/python
import hashlib
import requests
import random
import string
import json
import sys
f = open(sys.argv[1])