View 1_CTFZone_2018_Quals_exps
easypwn_strings, Mobile Bank
View 1_hitcon_ctf_2017_exps
Start, Easy To Say, Baby Ruby Escaping, Secret FS
View twctf-simple_note.py
#!/usr/bin/env python
# coding=utf8
from pwn import remote, process, p64, u64, ELF
from time import sleep
# p = process('./run.sh')
p = remote('pwn1.chal.ctf.westerns.tokyo', 16317)
# elf = ELF('/usr/lib64/libc.so.6')
elf = ELF('./libc.so.6')
View find.py
from gevent import monkey
monkey.patch_all()
import requests
import sys
from gevent.pool import Pool
from itertools import imap
View duck.conf
server {
listen [::]:80;
listen 80;
server_name duck.domain.com;
return 302 https://duck.domain.com/$uri;
}
server {
listen [::]:443;
View pwnable-rookiss-md5-exp.py
#!/usr/bin/env python
# coding=utf8
from pwn import process, p32, remote
from base64 import b64encode
from time import time
from subprocess import check_output
system = 0x8049187
buf = 0x804B0E0
View pwnable-rookiss-echo2.py
#!/usr/bin/env python
# coding=utf8
from pwn import u64, process, remote, shellcraft, context, asm
context.arch = 'amd64'
bss_o = 0x602098
p = process('./echo2')
View config
#.......
# font
#.......
#font -*-cure-medium-*-*-*-11-*-*-*-*-*-*-*
font pango:snap, Tamsyn, WenQuanYi Bitmap Song, FontAwesome, Unifont 8
#..........
# windows
#..........
View zctf-note3.py
#!/usr/bin/env python
# coding=utf8
from pwn import p64, u64, process, ELF
elf = ELF('/lib64/libc.so.6')
# elf = ELF('./libc-2.19.so')
p = process('./note3')
free_got = 0x602018