Skip to content

Instantly share code, notes, and snippets.

View bkth's full-sized avatar

Bruno Keith bkth

View GitHub Profile
@bkth
bkth / doit.py
Last active October 3, 2017 21:11
securimag's new year challenge, oversight from the author the git repo was publicly exposed so dirty script to rebuild the trees and get the sources
import os
import subprocess
def run_cmd(s):
return subprocess.check_output(s.split())
@bkth
bkth / sniper.py
Created September 21, 2017 00:14
pointers sniper
import time
import telnetlib
import sys
import binascii
import struct
import socket
def info(s):
print "[*] %s" % s
@bkth
bkth / ascii_art.py
Last active September 4, 2017 15:58
TW17 CTF
import time
import telnetlib
import sys
import binascii
import struct
import socket
# OOB access inside the ascii art table with \x7f letting us access the first 6 qwords of our input
# overwrite return address on stack to make ESP point to our buffer which jumps to system@plt with the stack setup
@bkth
bkth / rhme3exploit.py
Created September 1, 2017 23:05
rhme3 exploit chall
import time
import telnetlib
import sys
import binascii
import struct
import socket
HOST = "127.0.0.1" if len(sys.argv) < 2 else sys.argv[1]
PORT = 1337 if len(sys.argv) < 2 else int(sys.argv[2])
TARGET = (HOST, PORT)
@bkth
bkth / decode.py
Created July 9, 2017 09:10
kompreplicants tower of hanoi
# the encoding is
# first four bits are the depth in the tree encoded
# next 8 bits is the character encoded
# next X bits is the position in the tree encoded with the depth given by the first four bits
# The file has the following structure
# Each tree node encoded + 4 bits set to zero + each original character encoded by its position in the tree + few bits at the end
bits = []
@bkth
bkth / skybot_exploit.py
Last active March 26, 2017 22:27
exploit script for skybot (insomnihack ctf 2017)
#!/usr/bin/python
from pwn import *
import time
def recv_menu():
return s.recvuntil('>>> ')