Skip to content

Instantly share code, notes, and snippets.

View seltask2.asm
# Data Segment
.data
input: .asciiz "Input numbers\n"
msg_a: .asciiz "a: "
msg_b: .asciiz "b: "
vline: .asciiz "|"
minus: .asciiz "-"
plus: .asciiz "+"
index: .asciiz "a\b"
space: .asciiz " "
View alert.py
import requests
import time
url = "https://2015.legitbs.net/scoreboard#"
cur = ""
html = requests.get(url).text
tmp = html.split('\n')
for c in tmp:
if "class='locked'" in c:
View gist:a7e9de577bcb430a4258
wget --tries=inf --timestamping --recursive --level=inf --convert-links --page-requisites "http://cplusplus.com/reference"
View get cplusplus
wget --tries=inf --timestamping --recursive --level=inf --convert-links --page-requisites "http://cplusplus.com/reference"
View gist:28ecfafc98468525ed00
wget --tries=inf --timestamping --recursive --level=inf --convert-links --page-requisites "http://cplusplus.com/reference"
@icchy
icchy / Dockerfile
Created Feb 9, 2016
hackmd/Dockerfile
View Dockerfile
FROM debian:jessie
ENV DEBIAN_FRONTEND noninteractive
RUN apt-get update && apt-get -y upgrade && apt-get install -y apt-utils curl vim
# nodejs, npm
RUN curl -sL https://deb.nodesource.com/setup_5.x | bash -
RUN apt-get install -y nodejs
# git
RUN apt-get install -y git
View .zshpath
$HOME/tools/... # path to bin
@icchy
icchy / gist:ddacc226eb970c838862
Created Feb 14, 2016
access_logから雑にOS固有っぽい文字列を抽出するやつ
View gist:ddacc226eb970c838862
cat access_* | gawk -v FPAT='(\"[^\"]+\")' '{print $3}' | cut -d"(" -f2- | cut -d")" -f1 | sort | uniq -c | sort -gr | less
View icchyr_gmail_com.asc
-----BEGIN PGP PUBLIC KEY BLOCK-----
Comment: GPGTools - https://gpgtools.org
mQINBFZCFtQBEACeUh+jIMd5NIcWXy9iUkaa8FnTarJuKW/uk+LaufZclbpVYAtk
463WZAFdUB2aa5KYcBW3iAMNAV5Jy65W8xXbiqr/4RGYEcnwhPmjJvQqbQo2MEVV
cDGNg8mTfSm2GNhyNUFFpKs1SRNFYa9wJchgIpGBmmxfAHNYN1Aoakrf9CESP3O4
zu2/JM6OzpqUC2r3RRfaHCjLOAgDiDgeYIW6uC1LFURyClzwNwQNHVX4eMdFDn5X
3N4CvoVfGBSqNfTUjoqXpW+SQ74Ie2goMsclNyfvYRSeOs39q/WT0+kVvTsszs+X
nQ3zedHKzyIpCWC0sw3k/w4rp0ghBFhCm74CfBvc4eTplmgQLaNhPzKR/dke22G0
U4IAY1+Aj35ZssXqwW/yRTbigixWD1s4vyyv5FasdccxFVYIgfZtN/Uu2gIDf+9d
@icchy
icchy / exploit.py
Created Mar 16, 2016
Boston Key Party CTF 2016 segsh (pwn 6pts)
View exploit.py
#!/usr/bin/env python
from pwn import *
context(os='linux', arch='i386')
# context.log_level = 'debug'
HOST = "segsh.bostonkey.party"
PORT = 8888
conn = None