Skip to content

Instantly share code, notes, and snippets.

@m1ghtym0
m1ghtym0 / KCDMunich.md
Last active March 18, 2024 08:31
KCD Munich: Protecting Sensitive Workloads in the Cloud: A Practical Guide to K8s and Confidential Computing

Protecting Sensitive Workloads in the Cloud: A Practical Guide to K8s and Confidential Computing

Intel SGX

Projects

@m1ghtym0
m1ghtym0 / x.py
Created February 9, 2020 02:09
winterpreter
#!/usr/bin/env python2
from pwn import *
import sys
import struct
BINARY = './winterpreter.exe'
IS_REMOTE = True
H,P = ('183.107.102.15', 54321)
if not IS_REMOTE:
@m1ghtym0
m1ghtym0 / collections.py
Created December 30, 2018 15:06
35c3-collections
#import os
#flag = open("flag", "r")
#os.dup2(flag.fileno(), 1023)
#flag.close()
#
#import Collection
#a = Collection.Collection({"a":1337, "b":[1.2], "c":{"a":45545}})
#a = Collection.Collection({"a":1337, "b":[1.2], "c":{"a":45545}, "d":[1, 2]})
#b = Collection.Collection({"b":[1.2], "a":1337, "c":{"a":45545}, "d":[1, 2]})
@m1ghtym0
m1ghtym0 / Damocles
Last active January 4, 2018 04:23
HITCON CTF QUALS 2017
from pwn import *
import sys
from time import time, sleep
import ctypes
import threading
BINARY = './damocles.patched'
LIBC = './libc.so.6'
LOCAL_LIBC = '/lib/x86_64-linux-gnu/libc.so.6'
@m1ghtym0
m1ghtym0 / auir.py
Created September 17, 2017 20:32
CSAW 2017 Quals Pwnable Solutions
from pwn import *
import sys
BINARY = "./auir"
LIBC = './libc-2.23.so'
LOCAL_LIBC = '/usr/lib/libc.so.6'
# Set context for asm
context.clear()
context(os='linux', arch='amd64', bits=64)
from pwn import *
import sys
"""
Unpack the binary with upx -d
"""
BINARY = "./minesweeper"
# Set context for asm
context.clear()
@m1ghtym0
m1ghtym0 / go.py
Created July 14, 2017 02:36
Exploit for poli_wars challenge from PoliCTF 2017
from pwn import *
from re import findall
from ctypes import c_int32
# GLOBAL VARS
elf = ELF('./poli_wars')
libc = ELF('/usr/lib32/libc.so.6')
XWING_SIZE = 0x24 + 4
Z95_SIZE = 0x1c + 4
@m1ghtym0
m1ghtym0 / toilet-exploit.py
Created May 31, 2017 04:47
POC exploit for toilet service of FAUST-CTF-2017
#!/usr/bin/env python2
from pwn import *
from re import findall
from random import choice, randint
from string import digits, ascii_uppercase
from hashlib import sha256
from sys import argv, exit
MAX_NAME_LEN = 64