Skip to content

Instantly share code, notes, and snippets.

View hyunsikjeong's full-sized avatar
💭
Working hard

Hyunsik Jeong hyunsikjeong

💭
Working hard
View GitHub Profile
@hyunsikjeong
hyunsikjeong / HDWKeyStore.ts
Created October 22, 2018 07:20
HDWKeyStore.ts
export interface HDWKeyStore {
...
getSeedHashes(): Promise<SeedHash[]>;
importSeed(params: {
secret: SecretSeedStorage;
passphrase?: string;
}): Promise<SeedHash>;
exportSeed(params: {
seedHash: SeedHash;
passphrase: string;
@hyunsikjeong
hyunsikjeong / blog_keystore_hdw_example.js
Created October 22, 2018 07:32
blog_keystore_hdw_example.js
var keystore = require("codechain-keystore");
var CCKey = keystore.CCKey;
async function main() {
var passphrase = "codechain";
var cckey = await CCKey.create({ dbType: "in-memory" });
console.log(cckey);
var seedHash = await cckey.hdwseed.createSeed({ passphrase });
console.log(`Created a seed with hash: ${seedHash}`);
@hyunsikjeong
hyunsikjeong / solver_part1.py
Last active September 2, 2019 09:49
meow write-up (temp)
from PIL import Image
import os
image = Image.new('RGB', (768, 768), color = 'black')
image.save('base_input.png')
os.system('neko meow.n base_input.png base.png')
conv = dict()
# creating a image object
image = Image.new('RGB', (768, 768), color = 'black')
@hyunsikjeong
hyunsikjeong / solver.sage
Created September 11, 2019 01:46
Sneaky_RSA Solver
#!/usr/bin/env sage
from Crypto.Util.number import long_to_bytes
n = 502836922512486610504545362770164087747314568872499828554488035958487618069922372009938568627862332381791785204353412309048442266790788127586913418481611102032369784610186635918107975841710391423008666409824129040501563972923707425783141884753202039153453753743392862691624406109086024607836030202826295630221116437441121382375260821932448574939909495800160786027658225717271401949960794363690329988511853563276529456313673706170640973867577950303263264174744662074209624615772736887075860916876858014327808943244020378093080950653168444374777563212489171657106506007764866226182751595372496526204915222217458440333
c = 4542992230817920623622662202729093420190888652559243976860639953697825392586021006533342245836972027501745167799861363850426811090986182459017530104829121267723198005247073842044128647351222273325585614699334258919290475742633426495057070305887556653427791160755958392266834460356390652210993123440272512962788160444355984837855192511
@hyunsikjeong
hyunsikjeong / readme.txt
Created April 23, 2020 14:02
A PLUS Puzzle (PuzzleScript Script)
Play this game by pasting the script in http://www.puzzlescript.net/editor.html
@hyunsikjeong
hyunsikjeong / solver.py
Created May 18, 2020 11:46
solver of coooppersmith from DEFCON CTF 2020 Quals
from pwn import *
from ctypes import *
from Crypto.PublicKey import RSA
from Crypto.Util.number import long_to_bytes as l2b, inverse, GCD as gcd
import gmpy2
s = remote("coooppersmith.challenges.ooo", 5000)
s.recvuntil(":")
s.sendline("1" + "0" * 119)

Keybase proof

I hereby claim:

  • I am jhs7jhs on github.
  • I am rbtree (https://keybase.io/rbtree) on keybase.
  • I have a public key whose fingerprint is 3A77 4E51 675A E05C 40A8 AC1F A3C7 8ADB E4F0 C0DC

To claim this, I am signing this object:

@hyunsikjeong
hyunsikjeong / scheme.json
Created July 19, 2020 07:46
XTerm-like color scheme on Windows Terminal
{
"name": "XTerm-like",
"cursorColor": "#ebebeb",
"selectionBackground": "#ffffff",
"background" : "#000000",
"foreground" : "#ebebeb",
"black" : "#000000",
@hyunsikjeong
hyunsikjeong / solver.py
Created September 6, 2020 15:05
padrsa solver
from Crypto.Util.number import *
from binascii import unhexlify, hexlify
import gmpy2
from pwn import *
def get_cube():
sock = remote('crypto.kosenctf.com', 13001)
n = int(sock.recvuntil('\n')[3:-1].decode())
@hyunsikjeong
hyunsikjeong / solver.py
Created September 6, 2020 15:16
bitcrypto
from Crypto.Util.number import *
from pwn import *
r = remote("crypto.kosenctf.com", 13003)
r.recvuntil("your query: ")
r.sendline('b')
l = r.recvuntil('\n')
c = [int(x) for x in l.split('[')[1].split(']')[0].split(",")]