Skip to content

Instantly share code, notes, and snippets.

View faidamine's full-sized avatar

Faid Md Amine faidamine

View GitHub Profile
@faidamine
faidamine / pwn100.py
Last active April 3, 2018 17:03
HACK in CASABLANCA CTF - PWN 100
#!/bin/python
#Faid Mohammed Amine
#Fb : piratuer
#Solved After the CTF
from pwn import *
@faidamine
faidamine / funmail2.py
Created November 27, 2017 15:24
TUCTF 2017 - Reverse 100 - Funmail 2.0
#usr/bin/python
#Faid Mohammed Amine
#Fb : piratuer
######## TUCTF 2017 - Reverse 100 - Funmail 2.0
cipher = "zf760ow4l4X407}4bX;X~3w7~|T@WO@"
flag = ""
for i in range(len(cipher)):
#usr/bin/python
#Faid Mohammed Amine
#Fb : piratuer
from hashlib import md5
import string
import itertools
Extracting Files (16 Go)
Using FTK Imager and go to (var/www/)
You will find login.pl & index.pl & username.txt & password.txt
login ( admin : iforgotaboutthemathtest )
flag : flag{but_I_f0rgot_my_my_math_test_and_pants}
#!/usr/bin/perl
if ($ENV{'REQUEST_METHOD'} eq "POST") {
#usr/bin/python
#Faid Mohammed Amine
#Fb : piratuer
from pwn import *
import sys
import sys
import socket
import re
import random
import copy
def generateCard(brand, last): # Last is only used for test requiring specified last digits
card = ""
luhn = 0
#usr/bin/python
#Faid Mohammed Amine
#Fb : piratuer
from pwn import *
libc = ELF("libc-2.23.so")
r = remote("pwn.chal.csaw.io", 3764)
#usr/bin/python
#Faid Mohammed Amine
#Fb : piratuer
from pwn import *
con = remote('pwn.chal.csaw.io',8464)
con.recvuntil("Location:")
#usr/bin/python
#Faid Mohammed Amine
#Fb : piratuer
### [pwn] ASIS Finals 2017 - Mary Morton
from pwn import *
from formatStringExploiter.FormatString import FormatString
#usr/bin/python
#Faid Mohammed Amine
#Fb : piratuer
### [Crypto] ASIS Finals 2017 - Simple Crypto
def xor_str(x, y):
if len(x) > len(y):