Skip to content

Instantly share code, notes, and snippets.

@mrexcessive
mrexcessive / gist:1c22b23f04f9a3217d44
Last active April 26, 2022 08:11
Tupper Everything formulae in Python tested using .png created from GIMP. Expects no spaces in input data.
#!/usr/bin/python
#@mrexcessive
#this is based on java code from
# https://bitbucket.org/BJRowlett2/tuppers-formula/src/52fcf0b0ee94853e293a6f33e71ccd0c45a6e752/source/Tuppers.java?at=master
import sys,os
from PIL import Image
def GetNextFileName(fnamebase):
C:\mrexcessive\games>java -jar Equilinox_0_30_Windows.jar
No uniform variable called fadeOutPeriod found!No uniform variable called worldCenter found!No uniform variable called fadeOutPeriod found!No uniform variable called worldCenter found!No uniform variable called fadeOutPeriod found!No uniform variable called worldCenter found!No uniform variable called worldRadius found!No uniform variable called fadeOutPeriod found!No uniform variable called worldCenter found!No uniform variable called worldRadius found!No uniform variable called fadeOutPeriod found!No uniform variable called worldCenter found!No uniform variable called worldRadius found!No uniform variable called fadeOutPeriod found!No uniform variable called worldCenter found!No uniform variable called worldRadius found!No uniform variable called fadeOutPeriod found!No uniform variable called worldCenter found!No uniform variable called worldRadius found!No uniform variable called fadeOutPeriod found!No uniform variable called worldCenter found!No u
#!/usr/bin/python
# pwn.py for 0CTF2016.warmup
#@mrexcessive
import os, sys, code
import readline, rlcompleter
import socket
import time
import string
import struct
#!/usr/bin/python
# pwnserver.py based on MyLittlePwnie challenge code from VolgaCTF 2015
# in turn based on my EBP challenge code from PLAID
#@mrexcessive
import os, sys, code
import readline, rlcompleter
import socket
import time
import struct
treewalker: file format elf64-x86-64
Disassembly of section .init:
00000000004006d8 <_init>:
4006d8: 48 83 ec 08 sub $0x8,%rsp
4006dc: 48 8b 05 05 0b 20 00 mov 0x200b05(%rip),%rax # 6011e8 <_DYNAMIC+0x1d0>
4006e3: 48 85 c0 test %rax,%rax
#!/usr/bin/python
#pwnserver.py for 9447 CTF 2015 exploit / cards
#Whitehatters-uk
import os, sys, code
import readline, rlcompleter
import socket
import time
import struct
import telnetlib
@mrexcessive
mrexcessive / pwn.py
Created October 4, 2015 17:01
Exploit register and login web service using timing attack for DCTFU CTF 2015 web 300 challenge
#!/usr/bin/python
#See article on https://whitehatters.academy/
#target server http:10.13.37.4 (on VPN for DCTFU 2015 quals CTF)
import requests # see http://stackoverflow.com/questions/4476373/simple-url-get-post-function-in-python
import multiprocessing # see http://stackoverflow.com/questions/6286235/multiple-threads-in-python
# we need to run register.php and login.php at the same time
@mrexcessive
mrexcessive / gist:66b4ae7f399bb1ab3cbe
Last active October 4, 2015 16:20
xxd dump of the DCTFU 2015 CTF exploit 300 binary (e300) 64bit ELF
See article on https://whitehatters.academy/
0000000: 7f45 4c46 0201 0100 0000 0000 0000 0000 .ELF............
0000010: 0300 3e00 0100 0000 c008 0000 0000 0000 ..>.............
0000020: 4000 0000 0000 0000 d011 0000 0000 0000 @...............
0000030: 0000 0000 4000 3800 0900 4000 1c00 1b00 ....@.8...@.....
0000040: 0600 0000 0500 0000 4000 0000 0000 0000 ........@.......
0000050: 4000 0000 0000 0000 4000 0000 0000 0000 @.......@.......
0000060: f801 0000 0000 0000 f801 0000 0000 0000 ................
0000070: 0800 0000 0000 0000 0300 0000 0400 0000 ................
0000080: 3802 0000 0000 0000 3802 0000 0000 0000 8.......8.......
@mrexcessive
mrexcessive / gist:85d75b8725d07c0afbaa
Last active October 4, 2015 16:20
objdump output with added comments for DCTFU CTF exploit 300
See article on https://whitehatters.academy/
e300: file format elf64-x86-64
Disassembly of section .init:
00000000000007c8 <.init>:
7c8: 48 83 ec 08 sub $0x8,%rsp
7cc: 48 8b 05 0d 08 20 00 mov 0x20080d(%rip),%rax # 200fe0 <rand@plt+0x200730>
7d3: 48 85 c0 test %rax,%rax
@mrexcessive
mrexcessive / gist:11ecc80397a7bd46ad5a
Created October 4, 2015 16:19
ROP gadgets found in DCTFU CTF 2015 exploit 300 challenge
See article on https://whitehatters.academy/
ROP gadgets are:
0x0000000000000aeb : add bl, ch ; add eax, 0xb8 ; add cl, cl ; ret
0x0000000000000b6f : add bl, dh ; ret
0x0000000000000b6d : add byte ptr [rax], al ; add bl, dh ; ret
0x0000000000000b6b : add byte ptr [rax], al ; add byte ptr [rax], al ; add bl, dh ; ret
0x0000000000000aef : add byte ptr [rax], al ; add byte ptr [rax], al ; leave ; ret
0x0000000000000b6c : add byte ptr [rax], al ; add byte ptr [rax], al ; ret
0x0000000000000af0 : add byte ptr [rax], al ; add cl, cl ; ret
0x00000000000007db : add byte ptr [rax], al ; add rsp, 8 ; ret