Skip to content

Instantly share code, notes, and snippets.

View SiD3W4y's full-sized avatar

Tanguy Dubroca SiD3W4y

View GitHub Profile
@SiD3W4y
SiD3W4y / otree.ml
Created July 27, 2017 17:00
Simple tree directory listing exercise in ocaml
open Sys;;
let rec repeat chr times =
match times with
| 0 -> ()
| _ -> print_string chr; repeat chr (times-1)
;;
let print_entry path level =
repeat " " level;
@SiD3W4y
SiD3W4y / re2-solver.py
Last active April 3, 2017 08:54
Code to compute the flag reversed from the challenge binary (alexctf)
# Flag used to build the final one
flag = "L3t_ME_T3ll_Y0u_S0m3th1ng_1mp0rtant_A_{FL4G}_W0nt_b3_3X4ctly_th4t_345y_t0_c4ptur3_H0wev3r_1T_w1ll_b3_C00l_1F_Y0u_g0t_1t"
# Code table made of indices (used with the first flag)
table = [36, 0, 0, 0, 0, 0, 0, 0, 5, 0, 0, 0, 54, 0, 0, 0, 101, 0, 0, 0, 7, 0, 0, 0, 39, 0, 0, 0, 38, 0, 0, 0, 45, 0, 0, 0, 1, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0, 13, 0, 0, 0, 86, 0, 0, 0, 1, 0, 0, 0, 3, 0, 0, 0, 101, 0, 0, 0, 3, 0, 0, 0, 45, 0, 0, 0, 22, 0, 0, 0, 2, 0, 0, 0, 21, 0, 0, 0, 3, 0, 0, 0, 101, 0, 0, 0, 0, 0, 0, 0, 41, 0, 0, 0, 68, 0, 0, 0, 68, 0, 0, 0, 1, 0, 0, 0, 68, 0, 0, 0, 43, 0, 0, 0, 0, 0, 0, 0]
"""
Using this code table (dumped from memory)
0x24 0x00 0x00 0x00 0x00 0x00 0x00 0x00
0x05 0x00 0x00 0x00 0x36 0x00 0x00 0x00
@SiD3W4y
SiD3W4y / shcc.sh
Created March 21, 2017 20:16
Assembly to raw shellcode or runnable program
#!/usr/bin/zsh
ARCH="elf64"
TARGET=""
MODE="raw"
while getopts "a:f:e" arg; do
case $arg in
a)
extern crate crypto;
extern crate rand;
use std::thread;
use std::io::{Read,Write,BufRead,BufReader,BufWriter};
use std::net::{TcpListener, TcpStream};
use rand::Rng;
use crypto::md5::Md5;
use crypto::digest::Digest;
@SiD3W4y
SiD3W4y / PagesJaunes-CLI.py
Last active March 7, 2017 08:25
Simple cli for pages jaunes
import requests
import urllib
import bs4
import json
import base64
def parse_card(elem):
result = {
"name":"",
"phone":"",