Skip to content

Instantly share code, notes, and snippets.

Avatar
💭
fuck

Norm CreateRemoteThread

💭
fuck
View GitHub Profile
View pyzunpack.py
import os
import struct
import marshal
import zlib
import sys
import imp
import types
class CTOCEntry:
def __init__(self, position, cmprsdDataSize, uncmprsdDataSize, cmprsFlag, typeCmprsData, name):
View twctf-nothing.py
#!/usr/bin/env python3
import sys
import pwn
import struct
import binascii
# nc pwn02.chal.ctf.westerns.tokyo 18247
if(len(sys.argv) > 1):
View gctf-bruter.py
#!/usr/bin/env python3
import subprocess
rebuildDb = {}
for char_pos in range(0,8):
for byte_pos in range(0,7):
out = ["9","9","9","9","9","9","9","9"]
out[char_pos] = ("%d" % byte_pos)
View gctf-reversing-solve.py
#!/usr/bin/env python3
import angr
import claripy
p = angr.Project("a.out")
flag_chars = [claripy.BVS("flag_%d" % i,8) for i in range(15)]
flag = claripy.Concat(*flag_chars + [claripy.BVV(b'\n')])
View aeroctf-oldcryptosolve.py
#!/usr/bin/python
import pwn
import base64
import binascii
p = pwn.remote("tasks.aeroctf.com",44323)
def encryptWithKey(p,blk):
p.recvuntil("> ")
View aeroctf-oldcryptoserver.py
#!/usr/bin/env python3
from Crypto.Cipher import AES
import base64
import sys
import signal
server_secret = "Aero{XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX}"
KEY = 'XXXXXXXXXXXXXXXX'.encode()
View arduino-glitchtarget.c
int led1 = 2;
int led2 = 3;
void setup() {
Serial.begin(115200);
pinMode(led1,OUTPUT);
pinMode(led2,OUTPUT);
for(int i = 0;i < 3; i++)
{
flashGreen(100);
View sample-fmtstring-leak.py
#!/usr/bin/python
import binascii
import pwn
import sys
RHOST = "localhost"
RPORT = 54514
def leakStringAt(s,address):
View cw303-test.py
#!/usr/bin/python
from __future__ import print_function, division
import time
import logging
import os
from collections import namedtuple
import csv
View hacklu-cobol-otp-brute.py
#!/usr/bin/env python3
f = open("out","rb")
data = f.read()
f.close()
state = False
a = []
for c in data:
if c == 0xd or c == 0xa:
state = True