Skip to content

Instantly share code, notes, and snippets.

View RDxR10's full-sized avatar
🎯
Focusing

RDxR10

🎯
Focusing
View GitHub Profile
@RDxR10
RDxR10 / Kube-Theory-min-abstract.md
Last active October 27, 2020 11:25
Kubernetes Notes
  • Clusters: Compute resources that run containerized applications
  • Pods: Homogenenous set of containers that share data with a constraint which is to be deployed on the same cluster
  • Replication Controllers: Engaged in management of lifecycle of pods, thus they (in a way) check if a specific number of pods are running all the time.
  • Services: Basically load balancers that abstract a logical set of pods. Engaged in routing traffic to one of the pods.
  • Labels: Identifiers that filter out pods(homogenous) to perform common tasks.
@RDxR10
RDxR10 / privARM.md
Last active October 28, 2020 21:39

Privilege level

  • EL3 -> Secure Monitor
  • EL2 -> Hypervisor
  • EL1 -> OS Kernel
  • EL0 -> Userspace/Applications
@RDxR10
RDxR10 / random.txt
Last active December 21, 2020 17:55
r%uD 92AA6?[ AC:K6D 5:D2AA62CW2 76H @7 E96>X]
x7 J@F 2C6 2??@F?4:?8 D@>6E9:?8[ >2<6 DFC6 J@F 5@ E92E 2E E96 6?5 @7 E96 r%u] ~E96CH:D6[ :E CF:?D E96 E6>A6C2>6?E @7 A=2J6CD]

Questions(asked previously) - Dec/20:

  1. What's the math behind qubit measurement?
  2. How feasible do you think your project is?
  3. Briefly explain shor's algorithm.
#!/usr/bin/env python3
import angr
import claripy
if __name__ == '__main__':
print("[+] Solver Started")
binary = "./babymix"
flag_length = 0x16
@RDxR10
RDxR10 / z3al-writeup-ISFCR.py
Last active February 15, 2021 19:05
Desc : Do equations embarrass you? Well, nothing can stop you if you've got the z3al! File : https://shorturl.at/lCOU9
from z3 import *
st = [BitVec(f'{i}', 8) for i in range(0x27)]
s = Solver()
s.add(st[0x00]^st[0x02]^st[0x04]==0x60)
s.add(st[0x04]^st[0x06]^st[0x08]==0x36)
s.add(st[0x08]^st[0x0a]^st[0x0c]==0x71)
s.add(st[0x0c]^st[0x0e]^st[0x10]==0x32)
s.add(st[0x10]^st[0x12]^st[0x14]==0x3f)
s.add(st[0x14]^st[0x16]^st[0x18]==0x01)
@RDxR10
RDxR10 / Obscure-Obfuscation-ISFCR.ps1
Last active February 15, 2021 18:59
Desc : Tyrell Wellick is hiding his Windows command-line shell activity using 192-bit key data. He thinks that nobody would get to know what he does. Prove him wrong by recovering the sensitive information to seek what he is hiding. Mr. Robot suggests that credentials may be hidden in this manner. File : https://shorturl.at/divGQ
$Key = 92,48,90,2,7,5,1,9,8,8,6,75,39,2,45,6,3,7,7,20,56,71,5,5
$encoded = "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"
(New-Object System.Net.NetworkCredential("", (ConvertTo-SecureString -k $Key $encoded))).Password
@RDxR10
RDxR10 / Basement-Brunch-with-Simon-ISFCR.py
Created February 15, 2021 19:26
Desc : Simon is waiting for you in basement 36 and wants to have brunch together. Take this key and ciphertext to enter the basement. Have a pleasant brunch! Key: 0xABBBAAABAABAAABAAABABAABAAABABBA CT: 0xDCD9D598AE2990D31F230F3BE7813716 NOTE: Enclose flag within PESUCTF{} ALPHANUMERIC format : ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789
from simon import SimonCipher
my_simon = SimonCipher(0xABBBAAABAABAAABAAABABAABAAABABBA)
simon_ciphertext = 0xDCD9D598AE2990D31F230F3BE7813716
simon_plaintext = my_simon.decrypt(simon_ciphertext)
print(hex(simon_plaintext)[2:])
#note that this is in base36 format
  • the .tgs file is a telegram sticker
  • send it to the sticker bot on telegram to render it, or convert it to another format. The animation shows 6 characters "mrgr3y"
  • .tgs format is essentially a gzipped JSON. Get the JSON by using gzip -d
  • Load the JSON to see that there's a key named sandwich. The contents of this key is a long hex string. Decode this into bytes and save it to file.
  • This file is a 7z file protected with a password. Use the password mrgr3y
  • You'll get a file flag.RDxR10
  • That's a shell archive. Execute it : ./flag.RDxR10
  • You get the flag encoded in grey code.