Skip to content

Instantly share code, notes, and snippets.

View RDxR10's full-sized avatar
🎯
Focusing

RDxR10

🎯
Focusing
View GitHub Profile
@RDxR10
RDxR10 / Obscure-Obfuscation-ISFCR.ps1
Last active February 15, 2021 18:59
Desc : Tyrell Wellick is hiding his Windows command-line shell activity using 192-bit key data. He thinks that nobody would get to know what he does. Prove him wrong by recovering the sensitive information to seek what he is hiding. Mr. Robot suggests that credentials may be hidden in this manner. File : https://shorturl.at/divGQ
$Key = 92,48,90,2,7,5,1,9,8,8,6,75,39,2,45,6,3,7,7,20,56,71,5,5
$encoded = "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"
(New-Object System.Net.NetworkCredential("", (ConvertTo-SecureString -k $Key $encoded))).Password
@RDxR10
RDxR10 / z3al-writeup-ISFCR.py
Last active February 15, 2021 19:05
Desc : Do equations embarrass you? Well, nothing can stop you if you've got the z3al! File : https://shorturl.at/lCOU9
from z3 import *
st = [BitVec(f'{i}', 8) for i in range(0x27)]
s = Solver()
s.add(st[0x00]^st[0x02]^st[0x04]==0x60)
s.add(st[0x04]^st[0x06]^st[0x08]==0x36)
s.add(st[0x08]^st[0x0a]^st[0x0c]==0x71)
s.add(st[0x0c]^st[0x0e]^st[0x10]==0x32)
s.add(st[0x10]^st[0x12]^st[0x14]==0x3f)
s.add(st[0x14]^st[0x16]^st[0x18]==0x01)
#!/usr/bin/env python3
import angr
import claripy
if __name__ == '__main__':
print("[+] Solver Started")
binary = "./babymix"
flag_length = 0x16

Questions(asked previously) - Dec/20:

  1. What's the math behind qubit measurement?
  2. How feasible do you think your project is?
  3. Briefly explain shor's algorithm.
@RDxR10
RDxR10 / random.txt
Last active December 21, 2020 17:55
r%uD 92AA6?[ AC:K6D 5:D2AA62CW2 76H @7 E96>X]
x7 J@F 2C6 2??@F?4:?8 D@>6E9:?8[ >2<6 DFC6 J@F 5@ E92E 2E E96 6?5 @7 E96 r%u] ~E96CH:D6[ :E CF:?D E96 E6>A6C2>6?E @7 A=2J6CD]
@RDxR10
RDxR10 / privARM.md
Last active October 28, 2020 21:39

Privilege level

  • EL3 -> Secure Monitor
  • EL2 -> Hypervisor
  • EL1 -> OS Kernel
  • EL0 -> Userspace/Applications
@RDxR10
RDxR10 / Kube-Theory-min-abstract.md
Last active October 27, 2020 11:25
Kubernetes Notes
  • Clusters: Compute resources that run containerized applications
  • Pods: Homogenenous set of containers that share data with a constraint which is to be deployed on the same cluster
  • Replication Controllers: Engaged in management of lifecycle of pods, thus they (in a way) check if a specific number of pods are running all the time.
  • Services: Basically load balancers that abstract a logical set of pods. Engaged in routing traffic to one of the pods.
  • Labels: Identifiers that filter out pods(homogenous) to perform common tasks.