Skip to content

Instantly share code, notes, and snippets.

View intrd's full-sized avatar
💭
Things do not change, we change (silently).

intrd

💭
Things do not change, we change (silently).
View GitHub Profile
@intrd
intrd / keybase.md
Created September 27, 2015 17:58
keybase.md

Keybase proof

I hereby claim:

  • I am intrd on github.
  • I am intrd (https://keybase.io/intrd) on keybase.
  • I have a public key whose fingerprint is C2BE 4116 DD3B D236 54AC 75E5 32E1 7580 3ABE 5810

To claim this, I am signing this object:

@intrd
intrd / shellterlabs_game_of_life_custom_rule.py
Last active March 3, 2017 05:57
Solution to crypto50-give_life_to_the_letters @ Shellter Labs - Carnaval Hacking 2017
#!/usr/bin/python3
## Solution to crypto50-give_life_to_the_letters @ Shellter Labs - Carnaval Hacking 2017
## Conway's Game of Life w/ a 5th custom rule
# @author intrd - http://dann.com.br/ (original GoL implementation by https://github.com/JulianLaval/game-of-life-python)
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
from os import system, name
from sys import stdin
from copy import deepcopy
from html import parser
@intrd
intrd / int_pipebruteforcer_alexctf.py
Last active March 3, 2017 05:57
Pipe bruteforcer script to extract the flag @ rev100-re2 @ alexctf2k17
#!/usr/bin/python
## Pipe bruteforcer to extract the flag - rev100-re2 @ alexctf2k17
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
import sys, time
from subprocess import Popen, PIPE, STDOUT
fixed=""
i=0
@intrd
intrd / rsa_small_primes.py
Last active March 3, 2017 05:58
RSA - Recover and use private key generated w/ small prime numbers - crypto200-poor_rsa @ alexctf 2017
#!/usr/bin/python
## RSA - Recover and use private key generated w/ small prime numbers - crypto200-poor_rsa @ alexctf 2017
# @author intrd - http://dann.com.br/ (original script here: http://crypto.stackexchange.com/questions/19444/rsa-given-q-p-and-e)
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
from Crypto.PublicKey import RSA
import gmpy, base64
pub = open("key.pub", "r").read()
pub = RSA.importKey(pub)
@intrd
intrd / int_anagram.py
Last active March 3, 2017 05:58
intrd's anagram solver v.0.1
#!/usr/bin/python
## intrd's anagram solver v0.1
# @author intrd - http://dann.com.br/ (based on http://www.stealthcopter.com/blog/2009/11/python-anagram-solver/)
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
import sys
def anagramchk(word,chkword):
for letter in word:
if letter in chkword:
@intrd
intrd / int_wiki.py
Last active March 3, 2017 05:59
Wikipedia parser (birth data extractor)
## Wikipedia parser (birth data extractor)
# @author intrd - http://dann.com.br/ (based on @JBernardo's suggestion http://stackoverflow.com/a/12250675)
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
import re, requests
from bs4 import BeautifulSoup
def wikiGet(name):
url = 'http://en.wikipedia.org/w/api.php?action=query&prop=revisions&rvprop=content&rvsection=0&titles='+name+'&format=xml'
res = requests.get(url)
@intrd
intrd / cryptoquizz.py
Last active March 3, 2017 05:59
Parser to crypto50-cryptoquizz @ insomni'hack 2017
#!/usr/bin/python
## Parser to crypto50-cryptoquizz @ insomni'hack 2017
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
# int_wiki.py - https://gist.github.com/intrd/2c19ee22c3bd98ed07612c6ad3adc25d
# int_netcat.py - https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a
import re, sys, string, time
sys.path.append("../../LIBS/")
@intrd
intrd / get_started_exploit.py
Last active March 3, 2017 06:00
Buffer overflow using netcat.py to exploit rev200-get_started buffer @ 3dsctf-2k16
#!/usr/bin/python
## Buffer overflow using netcat.py to exploit rev200-get_started buffer @ 3dsctf-2k16
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
# int_netcat.py - https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a
import sys, socket, struct
sys.path.append("../../LIBS/")
from int_netcat import Netcat
@intrd
intrd / alien_dna2.py
Last active March 3, 2017 06:00
Script to correctly answer prog200-alien_dna2 @ 3dsctf-2k16
## Script to correctly answer prog200-alien_dna2 @ 3dsctf-2k16
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
# int_netcat.py - https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a
import socket, re, sys, time, operator, difflib
sys.path.append("../../LIBS/")
from int_netcat import Netcat
@intrd
intrd / alien_dna1.py
Last active March 3, 2017 06:00
Script to correctly answer prog100-alien_dna1 @ 3dsctf-2k16
## Script to correctly answer prog100-alien_dna1 @ 3dsctf-2k16
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
# int_netcat.py - https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a
import socket, re, sys
sys.path.append("../../LIBS/")
from int_netcat import Netcat