View aplit.c
#include <stdio.h>
#include <stdlib.h>
#include <fcntl.h>
int main(int argc, char **argv) {
int score = 0;
printf("CollageBored (R) Advanced Placement Literature Grader\n");
if (argc != 2) {
printf("Usage: %s [essay]\n", argv[0]);
return 1;
View crypto e.md

Data:

http://www.apk4fun.com/apk/1299/

Solution:

This is just a really difficult challenge. First, decompile snapchat.apk using a tool or a service like decompileandroid. Extact the src folder. Yay. Java.

The first step is to do a little bit of research on Snapchat decryption. Your research will probably lead you to this repo. However, it's outdated. Cry slowly. You should realize at this point that you need the Android ID to do anything. Use grep to search for android_id in src. This will reveal locations in the code that obtain the Android ID from the phone. You will eventually find in com.flurry.sdk.ea the following:

View chokes.md

2015 September 29 2015 July 24 2015 July 21 2015 July 16 2015 July 14

View Updates.md
View heibot.py
import sys;
import socket;
import string;
import random;
import urllib2;
import hashlib;
def genprefix():
return (random.choice("abcdef") + hashlib.md5(random.choice([
"heibot", "asdfbot",
View index.html
<!doctype>
<html>
<head>
<title><$WikiTitle$></title>
<link rel="stylesheet" href="http://maxcdn.bootstrapcdn.com/bootswatch/3.3.2/simplex/bootstrap.min.css" />
</head>
<body>
<nav class="navbar navbar-default">
<div class="container">
<div class="navbar-header">
View heibot.py
import sys;
import socket;
import string;
import random;
HOST = "irc.mibbit.net";
PORT = 6667;
NICK = "heibot";
CHANNEL = "#yolo1";
View Bandit
bandit0 bandit0
bandit1 boJ9jbbUNNfktd78OOpsqOltutMc3MY1
bandit2 CV1DtqXWVFXTvM2F0k09SHz0YwRINYA9
bandit3 UmHadQclWmgdLOKQ3YNgjWxGoRMb5luK
bandit4 pIwrPrtPN36QITSp3EQaw936yaFoFgAB
bandit5 koReBOKuIDDepwhWk7jZC0RTdopnAYKh
bandit6 DXjZPULLxYr17uwoI01bNLQbtFemEgo7
bandit7 HKBPTKQnIay4Fw76bEy8PVxKEDQRKTzs
bandit8 cvX2JJa4CFALtqS87jk27qwqGhBM9plV
bandit9 UsvVyFSfZZWbi6wgC7dAFyFuR6jQQUhR
View keybase.md

Keybase proof

I hereby claim:

  • I am failedxyz on github.
  • I am failedxyz (https://keybase.io/failedxyz) on keybase.
  • I have a public key whose fingerprint is 091D 3A47 D137 DC0F CEDC 1AD9 F8A8 A156 0109 AA3F

To claim this, I am signing this object:

View chatServer.js
// Load the TCP Library
net = require('net');
// Keep track of the chat clients
var clients = [];
// Start a TCP Server
net.createServer(function (socket) {
// Identify this client