Skip to content

Instantly share code, notes, and snippets.

#!/usr/bin/python
# CTF{golang_reversing_can_eat_my_balls_and_so_can_protocol_buffers}
try:
import hashlib as md5
except ImportError:
import md5
import random
<?php
$last_mtrand = 681012574;
for($ms_seed = 0;$ms_seed < 9000+5000;$ms_seed++)
{
mt_srand($ms_seed);
if(mt_rand() == $last_mtrand)
{
$next_mtrand = mt_rand();
printf(" + seed found: %d. next mt_rand: %d\n",$ms_seed,$next_mtrand);
#!/usr/bin/python
import os
import sys
import zlib
import struct
import copy
# ghetto recursive png brute force thingy
#!/-sr/bin/python
import sys
import pwn
import string
ALPHA="abcdefghijklmnopqrstuvwxyz0123456789 ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~ !\"#$%&(=>?@" + ")*+,-./" + ":;<[\]^_`y"
#"abcdefghijklmnopqrstuvwxy
MOV13="nopqrstuvwxyz{|}~ !\"#$%&(=>?@ABCDEFG-NOPQRSTUVWXYZ[\]^_`abcdefg)*+,-./01235JKLM" + "6789:;<" + "GHIhijklm'"
# 2016.05.26 03:39:02 AEST
#Embedded file name: byteme.py
import string
def encodeXor(pwd):
key = 'Insanity: doing the same thing over and over again and expecting different results.' * 2
result = []
i = 5
for x in pwd:
result.append(ord(x) + i ^ ord(key[i]) % 255)
#!/usr/bin/python
import libnum
f = open("in.txt","r")
data = f.readlines()
data_clustered = [(int(data[x].rstrip().lstrip("n = ")),int(data[x+1].rstrip().lstrip("e = ")),int(data[x+2].rstrip().lstrip("c = "))) for x in range(0,len(data),3)]
pubkeys = []
for (n,e,c) in data_clustered:
pubkeys.append(n)
n = 901796462301171565739703349468087652481762270880406207980491050692305143914260337476035477231197388191807301108496693582532771416429385387753673650343530994384388557149056387008313283495079322692001491210443495391597303123789161212071614073054610797879597127178965498199435637188914086772946425850020674759296688121245434369304849242060558473610216099612199848100168559693569133828860526634811544003068958026362652760879884251632889450350621045028485216435696699590335155628537907721977143022289885509427658394833334280896744865159878673917787722241324362136658806463039388148457030326676996125377151386341494203335593488921300329205536290056543388036967990095555049038478742916387874045149440050568762514284722780987692724563605231740123661716349397308777897623380527036501822651519408139786646972146253706231687056291201256995482219566593746710504841942546500008475444431592301584613179019140807304631029069880520177263021250558947771232358539731667859514647840790836943482204233527258755540614722773212963174604858008
#!/usr/bin/python
import pwn
p = pwn.remote('120.26.120.82',9999)
p.send("py09ce12e1-b775-4bda-af37-8abd886478ee\0djksa;fjhklajkdlsfjl;kajsdlkfa\n")
print p.recv()
p.interactive()
# p.interactive()
# p.send("pi09ce12e1-b775-4bda-af37-8abd886478ee\0ls\"asdf'asdf")
import base64
from Crypto.Cipher import AES
from Crypto import Random
# pad = lambda s: s + (BS - len(s) % BS) * chr(BS - len(s) % BS)
# unpad = lambda s : s[:-ord(s[len(s)-1:])
KEY = "58897d583d888978b62469889d584472"
PW = "XIANJIAN "
#!/usr/bin/python
from PIL import Image
import sys
f = Image.open("doge2.png")
f_rgb = f.convert("RGB")
print f_rgb.getpixel((370,336))
print f_rgb.getpixel((404,342))