Skip to content

Instantly share code, notes, and snippets.

View cubarco's full-sized avatar

Cubarco cubarco

View GitHub Profile
@cubarco
cubarco / 1.txt
Last active April 4, 2023 08:03
prompt ssti
{question} {question.__class__}
@cubarco
cubarco / dein.log
Created September 30, 2018 10:29
vim-config logs
Runtimepath updated: (2018/09/30 18:22:08)
Update started: (2018/09/30 18:22:08)
(16/95) [=== ] vim-wordy
( 1/95) Cloning into '/home/cubarco/.cache/vim/dein/repos/github.com/hail2u/vim-css3-syntax'...
( 2/95) Cloning into '/home/cubarco/.cache/vim/dein/repos/github.com/AndrewRadev/dsf.vim'...
( 3/95) Cloning into '/home/cubarco/.cache/vim/dein/repos/github.com/pangloss/vim-javascript'...
( 4/95) Cloning into '/home/cubarco/.cache/vim/dein/repos/github.com/dag/vim-fish'...
( 5/95) Cloning into '/home/cubarco/.cache/vim/dein/repos/github.com/chemzqm/unite-location'...
( 6/95) Cloning into '/home/cubarco/.cache/vim/dein/repos/github.com/guns/xterm-color-table.vim'...
( 7/95) Cloning into '/home/cubarco/.cache/vim/dein/repos/github.com/rafi/vim-badge'...
@cubarco
cubarco / 1_CTFZone_2018_Quals_exps
Last active July 24, 2018 03:03
CTFZone 2018 Quals exps
easypwn_strings, Mobile Bank
Shellcode_revenge++, Hellozip
@cubarco
cubarco / 1_hitcon_ctf_2017_exps
Last active October 12, 2019 19:57
HITCON CTF 2017
Start, Easy To Say, Baby Ruby Escaping, Secret FS
#!/usr/bin/env python
# coding=utf8
from pwn import remote, process, p64, u64, ELF
from time import sleep
# p = process('./run.sh')
p = remote('pwn1.chal.ctf.westerns.tokyo', 16317)
# elf = ELF('/usr/lib64/libc.so.6')
elf = ELF('./libc.so.6')
from gevent import monkey
monkey.patch_all()
import requests
import sys
from gevent.pool import Pool
from itertools import imap
@cubarco
cubarco / duck.conf
Last active April 9, 2016 13:20
Nginx config file for DuckDuckGo mirror.
server {
listen [::]:80;
listen 80;
server_name duck.domain.com;
return 302 https://duck.domain.com/$uri;
}
server {
listen [::]:443;
#!/usr/bin/env python
# coding=utf8
from pwn import process, p32, remote
from base64 import b64encode
from time import time
from subprocess import check_output
system = 0x8049187
buf = 0x804B0E0
#!/usr/bin/env python
# coding=utf8
from pwn import u64, process, remote, shellcraft, context, asm
context.arch = 'amd64'
bss_o = 0x602098
p = process('./echo2')