Skip to content

Instantly share code, notes, and snippets.

View minhtt159's full-sized avatar

Minh Trần minhtt159

View GitHub Profile
@minhtt159
minhtt159 / fake_prince.py
Created August 30, 2018 07:07
MeePwn CTF Final 2018 - Fake Prince
#!/usr/bin/env python2
from gmpy2 import powmod, is_prime
from flag import FLAG
import sys
from hashlib import sha256
from os import urandom
import sys
def write_to_file(num):
@minhtt159
minhtt159 / tiktok.py
Created August 30, 2018 08:36
MeePwn CTF Final 2018 - TikTok
#!/usr/bin/env python3
import sys, hashlib
def decrypt_password(user, pass_enc):
key = hashlib.md5(user + b"283i4jfkai3389").digest()
passw = ""
for i in range(0, len(pass_enc)):
passw += chr(pass_enc[i] ^ key[i % len(key)])
@minhtt159
minhtt159 / dumps.txt
Created August 30, 2018 08:43
MeePwn CTF Final 2018 - Handmade
function name: (null)
number of ops: 39
compiled vars: !0 = $flag, !1 = $_box, !2 = $magic
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
3 0 E > ASSIGN !0, 'FLAG+HERE'
5 1 NOP
13 2 NOP
21 3 NOP
33 4 NOP
@minhtt159
minhtt159 / server.py
Created October 29, 2018 08:07
Tea Party - SVATTT
import struct
import os
class Tictactoe:
def __init__(self, key):
self.delta = 0x9E3779B9
self.mask = 0xffffffff
self.rounds = 64
self.block_size = 8 #char
self.key = struct.unpack('4I', key)
@minhtt159
minhtt159 / server.py
Last active November 5, 2018 10:43
RSA - SVATTT
from Crypto.Util import number
from Crypto.PublicKey import RSA
from hashlib import sha1
from os import urandom as rand
import gmpy2
class RSA_key:
def __init__(self, magic, size=2048):
self._key = RSA.generate(size)
self._magic = magic
@minhtt159
minhtt159 / PyLock.py
Last active November 5, 2018 10:12
PyLock - SVATTT
# uncompyle6 version 3.2.4
# Python bytecode 2.7 (62211)
# Decompiled from: Python 2.7.15rc1 (default, Apr 15 2018, 21:51:34)
# [GCC 7.3.0]
# Embedded file name: PyLock.py
import sys, os
from itertools import cycle, izip
import base64
class XorLock:
@minhtt159
minhtt159 / lsb.py
Created November 5, 2018 10:32
LSB - SVATTT
from PIL import Image
def main():
img = Image.open("for1.png")
pixels = img.load()
h = img.size[0]
w = img.size[1]
out1 = ''
for row in range(h):
for col in range(w):
@minhtt159
minhtt159 / ec.py
Created November 17, 2018 03:06
ECC - Return
p = 0xffffffff00000001000000000000000000000000ffffffffffffffffffffffff
a = p-3
b = 0x5ac635d8aa3a93e7b3ebbd55769886bc651d06b0cc53b0f63bce3c3e27d2604b
r = 0xffffffff00000000ffffffffffffffffbce6faada7179e84f3b9cac2fc632551
x = 0x6b17d1f2e12c4247f8bce6e563a440f277037d812deb33a0f4a13945d898c296
y = 0x4fe342e2fe1a7f9b8ee7eb4a7c0f9e162bce33576b315ececbb6406837bf51f5
class CurveFp(object):
def __init__(self, p, a, b):
assert 3 == p % 4
@minhtt159
minhtt159 / EOSAttack.js
Created November 29, 2018 07:07
BCTF - EOSGame
contract Attack{
address target = 0x804d8B0f43C57b5Ba940c1d1132d03f1da83631F;
address owner = 0x622afc0cbaa152e6615be060f93bc88440a8442d;
uint256 MOD_NUM = 20;
EOSGame game;
constructor() public{
game = EOSGame(target);
}
function check() public view returns (uint256){
uint count = 1;
@minhtt159
minhtt159 / Fake3D.js
Created November 29, 2018 07:22
BCTF - Fake3D
contract Attack{
address target = 0x4082cC8839242Ff5ee9c67f6D05C4e497f63361a;
Fake3D game;
constructor() public{
game = Fake3D(target);
for (uint256 i=0; i<900; i++){
game.airDrop();
}
}
}