Skip to content

Instantly share code, notes, and snippets.

View SakiiR's full-sized avatar
🎯
Focusing

SakiiR SakiiR

🎯
Focusing
View GitHub Profile
@SakiiR
SakiiR / bf.js
Created April 17, 2023 08:28
PlaidCTF - CSS bruteforce write up
const puppeteer = require('puppeteer');
const Jimp = require("jimp");
const DEBUG = false;
const URL = "https://plaidctf.com/files/css.74486b61b22e49b3d8c5afebee1269e37b50071afbf1608b8b4563bf8d09ef92.html"
const minimal_args = [
'--autoplay-policy=user-gesture-required',
'--disable-background-networking',
'--disable-background-timer-throttling',
This file has been truncated, but you can view the full file.
#include <stdio.h>
int main()
{
printf("%u\n", (((((((0 +0 +0 +0)<((sizeof "0b1_1011")-1)?"0b1_1011"[((sizeof "0b1_1011")-1)-1-(0 +0 +0 +0)]:0)=='1')<<((((((0 +0 +0 +0)<0 +0 +0 +0?((((((0 +0 +0 +0))<((sizeof "0b1_1011")-1)?"0b1_1011"[((sizeof "0b1_1011")-1)-1-((0 +0 +0 +0))]:0))|1)=='1'):0)+((0 +0 +0 +1)<0 +0 +0 +0?((((((0 +0 +0 +1))<((sizeof "0b1_1011")-1)?"0b1_1011"[((sizeof "0b1_1011")-1)-1-((0 +0 +0 +1))]:0))|1)=='1'):0)+((0 +0 +0 +2)<0 +0 +0 +0?((((((0 +0 +0 +2))<((sizeof "0b1_1011")-1)?"0b1_1011"[((sizeof "0b1_1011")-1)-1-((0 +0 +0 +2))]:0))|1)=='1'):0)+((0 +0 +0 +3)<0 +0 +0 +0?((((((0 +0 +0 +3))<((sizeof "0b1_1011")-1)?"0b1_1011"[((sizeof "0b1_1011")-1)-1-((0 +0 +0 +3))]:0))|1)=='1'):0))+(((0 +0 +4 +0)<0 +0 +0 +0?((((((0 +0 +4 +0))<((sizeof "0b1_1011")-1)?"0b1_1011"[((sizeof "0b1_1011")-1)-1-((0 +0 +4 +0))]:0))|1)=='1'):0)+((0 +0 +4 +1)<0 +0 +0 +0?((((((0 +0 +4 +1))<((sizeof "0b1_1011")-1)?"0b1_1011"[((sizeof "0b1_1011")-1)-1-((0 +0 +4 +1))]:0))|1)=='1'):0)+((0 +0 +4 +2)<0 +0 +0 +0?((((((0 +0 +4 +2))
@SakiiR
SakiiR / toggle-hyperv-forfaceit.bat
Created July 21, 2022 13:24
HyperV toggle - Faceit =)
@echo off
echo Virtualization must be disabled to use anti-cheat clients like FACEIT and ESEA
echo.
net session >nul 2>&1
if %ERRORLEVEL% EQU 0 goto :chchchchoices
echo This script requires elevated privileges. Re-run as Administrator to continue
goto :exit
:chchchchoices
@SakiiR
SakiiR / exploit.html
Created October 25, 2021 09:38
ASIS CTF quals 2021 - Lovely Nonces
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8" />
<meta http-equiv="X-UA-Compatible" content="IE=edge" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<title>Exploit</title>
</head>
<body>
<script>
@SakiiR
SakiiR / reverse-shell.c
Created October 18, 2021 14:06
C Reverse shell
// gcc /tmp/reverse-shell.c -o /tmp/test
#include <arpa/inet.h>
#include <netinet/in.h>
#include <stdio.h>
#include <stdlib.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <unistd.h>
#include <netdb.h>
@SakiiR
SakiiR / diabotical-suggestions.md
Last active July 20, 2021 09:00
Diabotical Sugestions

Time Trials

  • New High Score / World Record notification
  • Leaderboard
  • Ghost feature
    • Can be downloaded and set from player profiles
    • In game menu to handle this
  • Give permanent/persistent medals on profiles/leaderboard ( like cs:go medals or rocket league titles )
  • Add run demos on player profiles etc
@SakiiR
SakiiR / dorksMe.js
Last active May 10, 2021 03:03 — forked from S42X/dorksMe.js
Compilation of some dorks when doing bug bounty or pentest on a scope. This script will open like 37 tabs with all theses dorks. you can add yours.
/*
* You can test this script by opening your favorite console browser
* Then launch just 3 dorks with: dorksMe(`example.com`).slice(5,8).map( el => window.open(el))
* Or all the dorks with: dorksMe(`example.com`).map( el => window.open(el))
* Enjoy :)
* @_SaxX_
*/
function dorksMe(site) {
return [
@SakiiR
SakiiR / exploit.py
Created December 4, 2020 21:50
Dojo challenge #4 - Exploit Script
#!/usr/bin/env python
# @SakiiR
import z3
def format_chunks(m, chunks):
return "-".join([f"{int(str(m[c])):04d}" for c in chunks])
def doit_twice(s, chunks):
try:
@SakiiR
SakiiR / r2.py
Last active July 15, 2023 14:08
Radare2 utils :)
class R2:
def __init__(self, file_path, args=[], debug=False):
self._r = r2pipe.open(file_path, args)
self._debug = debug
def cmd(self, cmd, debug=True):
if self._debug and debug:
print(f"Executing command: '{cmd}'")
res = self._r.cmd(cmd).rstrip("\n")
if self._debug and debug:
@SakiiR
SakiiR / nmap.sh
Created August 18, 2020 14:44
Some nmap scripts
nmapFast() {
if [[ -z $1 ]] ; then
echo "USAGE: nmapFast IP/Domain"
return
fi
item=$1
item2=$(echo -ne $item|tr '/' '_')
echo " +++ "