Skip to content

Instantly share code, notes, and snippets.

View ks75vl's full-sized avatar
🎯
Focusing

None ks75vl

🎯
Focusing
View GitHub Profile
console.log('hello', document.cookie);
find / -type f -name FLAG.txt > /tmp/out.txt
import os
os.system('find / -type f -name flag.txt')
echo 123;
@ks75vl
ks75vl / exploit.py
Last active April 9, 2019 03:55
duudududduduud
from Crypto.Cipher import AES
from urllib import quote, unquote
import base64
#AES
def pad(s):
return s + (16 - len(s) % 16) * chr(16 - len(s) % 16)
def encrypt(key, plain, IV):
cipher = AES.new(key, AES.MODE_CBC, IV)
return cipher.encrypt(plain)
<?php
echo 123;
?>
<script>alert(1);</script>
from z3 import *
key = IntVector('key', 16)
s = Solver()
s.add(0x8120 == 0x0A * key[0] + 0x0C * key[1] + 0x3E * key[6] + 0x0F * key[3] + 0x5F * key[10] + 0x02 * key[9] + 0x26 * key[13] + 0x11 * key[12] + 0x19 * key[15] + 0x43 * key[14])
s.add(0x6002 == 0x08 * key[0] + 0x0F * key[2] + 0x32 * key[7] + 0x19 * key[5] + 0x40 * key[12] + 0x0D * key[8] + 0x55 * key[13])
s.add(0x7C2D == 0x3A * key[0] + 0x37 * key[5] + 0x19 * key[2] + 0x0C * key[9] + 0x56 * key[14] + 0x39 * key[13] + 0x23 * (key[1] + key[7]))
s.add(0x6D22 == 0x43 * key[0] + 0x47 * key[3] + 0x61 * key[7] + 0x27 * key[5] + 0x0A * key[11] + 0x3C * key[10])
@ks75vl
ks75vl / exploit.py
Last active January 9, 2019 01:07
Easy web server
import requests
HOST = 'http://service.chung96vn.cf:8080'
LOGIN = '/login'
CHUNG96VN = '/chung96vn'
INFO = '/info'
password = 'MTUhXldFI1RHQVQjWUVIR1EjXldBRlFXVFRRI15AI0Ah'
def login():
@ks75vl
ks75vl / exploit.py
Created January 8, 2019 15:38
IQTest2
import requests
import time
import base64
HOST = 'http://45.76.148.31:9004'
level13_question = 'Flower?'
def main():
data = open('data.txt').read()
data = data.split('\n')[:-1]