Skip to content

Instantly share code, notes, and snippets.

View ebubekirtrkr's full-sized avatar
💻
Learning

Ebubekir Türker ebubekirtrkr

💻
Learning
View GitHub Profile
@ebubekirtrkr
ebubekirtrkr / shellcode_check.md
Last active February 4, 2021 09:41
Shellcode Checking Bash Script

İşlerimizi biraz kolaylaştımrak için şöyle bi script yazdım, s uzantılı dosyayı veriyoz bir de badchar kontrolü yapılacak bytei \xbb formatında veriyoz hallediyo, badchari vermezsek otomatik \x00 kontrol ediyor.

Çıktı olarak filename-raw, filename-elf üretiyor. -d verirseniz çıktıları siliy.

Örnek:

./runner.sh -f benimkucukshellcodeum.s

./runner.sh -f benimkucukshellcodeum.s -b '\x48'

@ebubekirtrkr
ebubekirtrkr / index.md
Last active February 15, 2021 16:01
pwn college shellcoding tutorial all in one compiler script

It creates <filename>-raw <filename>-elf . Former is raw form of shellcode and latter is executable.

pwntools and nasm must be installed

to install:

pip install pwntools && sudo apt install nasm

Also I recommend you to create /flag in local machine and own it with user to make life more easier

@ebubekirtrkr
ebubekirtrkr / challenge.md
Created February 23, 2021 08:58
Tenable CTF 2021 - We Need an Emulator Writeup

Attached is some some never-before-seen assembly code routine that we pulled off a processor which is responsible for string decryption. An input string is put into TRX register, then the routine is run, which decrypts the string.

For example, when putting UL\x03d\x1c'G\x0b'l0kmm_ string in TRX and executing this code, the resulting string in TRX is decrypted as 'tenable.ctfd.io'.

A few things we know about this assembly:

There are only two registers, DRX and TRX. These are used to hold variables throughout the runtime.

Operand order is similar to the AT&T syntax ,which has destination operand first and source operand 2nd ie: MOV DRX, "dogs", puts the string "dogs" into DRX

@ebubekirtrkr
ebubekirtrkr / is_king_in_Check.py
Created February 27, 2021 21:06
Tenable CTF Is King In Check Solution
import itertools
WHITE = "white"
BLACK = "black"
class Game:
def __init__(self,pieces):
self.playersturn = BLACK
self.message = "NoCheck"
self.gameboard = {}
self.placePiecesEdited(pieces)
@ebubekirtrkr
ebubekirtrkr / bcyrpt_example_with_threading.py
Last active January 22, 2022 21:51
Python bcyrpt example with multi-threading
import concurrent.futures
import bcrypt
VERBOSE=False
output_file=open("bcrypted_passwords.txt","w+")
def do_bcyrpt(passw):
hashed =bcrypt.hashpw(passw.encode(), bcrypt.gensalt()).decode()
if VERBOSE:
print(hashed)
output_file.write(hashed+"\n")
@ebubekirtrkr
ebubekirtrkr / discord_flag_emoji_list.js
Created April 1, 2021 18:06
Discord Flag Emoji List
[
":checkered_flag:",
":crossed_flags:",
":flag_ac:",
":flag_ad:",
":flag_ae:",
":flag_af:",
":flag_ag:",
":flag_ai:",
":flag_al:",
@ebubekirtrkr
ebubekirtrkr / sha256_example.py
Created April 23, 2021 12:42
Python sha256 example with multi-threading from file
import concurrent.futures
from hashlib import sha256
VERBOSE=False
output_file=open("hashed_passwords.txt","w+")
def do_sha256(passw):
hashed = sha256(passw.rstrip().encode()).hexdigest()
if VERBOSE:
print(hashed)
output_file.write(hashed+"\n")
output_file.flush()
#include <stdio.h>
#include <string.h>
//190410084
int main()
{
char cumle[255];
printf("Bir cümle girin: \n");
gets(cumle);
int cumle_uzunluk = strlen(cumle);
int k_sayisi = 0;
@ebubekirtrkr
ebubekirtrkr / base64.txt
Last active November 1, 2021 06:51
Killer Queen CTF 2021 - Tweety Birb PWN Challenge
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
@ebubekirtrkr
ebubekirtrkr / base64.txt
Last active November 1, 2021 07:09
Killer Queen CTF 2021 - Broke College Students
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