Skip to content

Instantly share code, notes, and snippets.

View LiveOverflow's full-sized avatar
🔴
verified hacker

LiveOverflow

🔴
verified hacker
View GitHub Profile
@LiveOverflow
LiveOverflow / cookbook.py
Last active June 6, 2022 11:54
Exploit for cookbook challenge from Boston Keyparty CTF 2016
import struct
import sys
import subprocess
import socket
import telnetlib
import ctypes
"""
Cookbook - 6 - 0 solves : pwn: a top chef wrote this cookbook for me but i think he has an extra secret recipe!
https://s3.amazonaws.com/bostonkeyparty/2016/58056c425dc617b65f94a8b558a4699fedf4a9fb.tgz
import socket
import telnetlib
import struct
import hashlib
import random
"""
root $ python web_of_science2.py
[*] connected to webofscience2.2016.volgactf.ru:45679
[+] recv: 'Tell me your name first\n'
@LiveOverflow
LiveOverflow / zwiebel.py
Created October 8, 2016 08:35
TUM CTF 2016
import sys
import r2pipe
r2 = r2pipe.open("./zwiebel2")
r2.cmd("e dbg.profile=zwiebel.rr2")
r2.cmd("doo") # reopen for debugging
r2.cmd("db 0x400875") # set breakpoint at `call r14`
r2.cmd("dc") # continue until breakpoint is hit
def step():
@LiveOverflow
LiveOverflow / babyfengshui.py
Created January 29, 2017 15:14
33c3 ctf babyfengshui (pwn 150)
import socket
import telnetlib
import struct
"""
developed on stream: https://www.youtube.com/watch?v=zWgS6fTw4Ts
"""
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(('127.0.0.1', 2323))
import requests
import re
import operator
def get_scoreboard():
r = requests.get('http://rhme.riscure.com/scores')
return re.findall(r'<a href="user\?id=([0-9]+)">', r.text)
`timescale 1ns / 1ps
//////////////////////////////////////////////////////////////////////////////////
// Company:
// Engineer:
//
// Create Date: 01:48:35 02/27/2017
// Design Name:
// Module Name: main
// Project Name:
// Target Devices:
#include <unistd.h>
#include <stdlib.h>
#include <stdio.h>
#include <signal.h>
#include <pty.h>
#include <fcntl.h>
#include <time.h>
#include <sys/wait.h>
// gcc cook3.c -lutil -o cook3 -Wall
@LiveOverflow
LiveOverflow / gql.py
Created June 21, 2017 19:43
Blind GQL injection and optimised binary search - A7 ~ Gee cue elle (misc) Google CTF 2017
import requests
import string
import random
import urllib
import time
import base64
from decimal import Decimal
# Blind GQL injection and optimised binary search - A7 ~ Gee cue elle (misc) Google CTF 2017
# https://www.youtube.com/watch?v=za_9hrq-ZuA
@LiveOverflow
LiveOverflow / fsec_solve.py
Created October 4, 2017 10:42
Fsec2017 z3 solution
from z3 import *
import struct
# calculate e,f,d for a given input password
def calc(m):
e = 0
f = 0
d = 0
for i in xrange(0, len(m)):
c = ord(m[i])
@LiveOverflow
LiveOverflow / software_update.sage
Created March 16, 2018 19:16
34C3 CTF software_update (crypto)
import sage.all
import hashlib
# part1 - https://www.youtube.com/watch?v=Vgdhlh6evjI
# part2 - https://www.youtube.com/watch?v=EOlddNofKxo
# prepare a table of bits
def bits_of(x):
bits = []
for c in "{:08b}".format(x):