View xpl_pwnie.py
#!/usr/bin/env python | |
import struct, sys, time, re | |
from nulllife import * | |
import requests, urllib | |
# Volga CTF 2015 | |
# exploit my little pwnie | |
# www.null-life.com / @_g05u_ | |
FD = 4 |
View hackt1_web.py
#!/usr/bin/env python | |
import struct, sys, time, re | |
import requests, urllib | |
# Volga CTF 2015 | |
# exploit HackT - 1 | |
# www.null-life.com / @_g05u_ | |
pass_addr = 0x606400 #password address in bss | |
QUERYS = 110 |
View venom_solver.py
import struct, random | |
# TJCTF 2015 Venom reversing chall | |
# www.null-life.com | |
# @_g05u_ | |
f = open('./venom', 'rb') | |
data = f.read() | |
f.close() | |
s = '1462132F222E292F'.decode('hex') |
View quine_xpl.py
#!/usr/bin/env python | |
import struct, sys, time | |
from nulllife import * | |
# DragonSector CTF | |
# exploit quine | |
# www.null-life.com / @_g05u_ | |
def n2h(val, nbits = 32): | |
return ((val + (1 << nbits)) % (1 << nbits)) |
View alewife_exploit.py
#!/usr/bin/env python | |
import struct, sys, time | |
from nulllife import * | |
import ast | |
# @_g05u_ | |
#boston ctf party 2015 | |
# exploit alewife chall | |
# www.null-life.com |
View hackim_2015_mixme.py
#!/usr/bin/env python | |
from nulllife import * | |
import sys, time | |
# www.null-life.com | |
# write-up / exploit by @_g05u_ | |
# Hackim/nullcon CTF 2015 - mixme exploiting 400 points | |
# Flag: aw3s0m3++_hipp1e_pwn_r0ckst4r | |
c = 0x61 |
View csaw_2014_s3.py
#!/usr/bin/env python | |
import struct, sys, time | |
from nulllife import * | |
#CSAW 2014 CTF | |
#s3 exploit | |
s = NullSocket("54.165.225.121", 5333) | |
s.readuntil("> ") |
View csaw_2014_xorcise.py
#!/usr/bin/env python | |
import struct, sys, time | |
from nulllife import * | |
#CSAW 2014 CTF | |
#xorcise exploit | |
def xor(data, key): | |
o = '' | |
for i in range(len(data)): |
View csaw_2014_greenhorn_exploit.py
#!/usr/bin/env python | |
import struct, sys, time | |
from nulllife import * | |
#CSAW 2014 CTF | |
#greenhorn exploit | |
offset_data = 0x3F8 | |
s = NullSocket("54.164.253.42", 9998) | |
s.readuntil("Password: ") |
View ncn_explicit_exploit.py
#!/usr/bin/env python | |
import struct, sys, time | |
from nulllife import * | |
# | |
#NoConName CTF | |
#explitcit exploit 500pts | |
# | |
s = NullSocket("88.87.208.163", 7070) |
NewerOlder