Skip to content

Instantly share code, notes, and snippets.

View parrot409's full-sized avatar
🏴
Maybe doing CTF?

parrot409 parrot409

🏴
Maybe doing CTF?
View GitHub Profile
@parrot409
parrot409 / redpwn2020_unintended_got_stacks.py
Last active June 27, 2020 04:16
My redpwn2020 solutions
#!/usr/bin/env python3
#Written by 0xParrot
#This is unintended solution.
import requests
import string
import base64
import random
import json
import time
flag = ""
@parrot409
parrot409 / redpwn2020_viper.py
Last active June 27, 2020 04:17
redpwn2020_viper
#!/usr/bin/env python3
#Written by 0xParrot
import requests
import uuid
import re
import base64
addr = "2020.redpwnc.tf:31291"
addrP = "http://2020.redpwnc.tf:31291"
@parrot409
parrot409 / ff
Created December 19, 2020 19:38
ff
alert();

So safe website

I inspired this challenge while i was playing a challenge by @53c0nd-2473.

  1. Overwrite Object object's getOwnPropertyNames with "nice feature" to bypass dompurify + trusted types. {"name":{"__proto__":{"__proto__":{"constructor":{"getOwnPropertyNames":"B"}}}}}
  2. Bypass custom filter with noscript tag. example: <noscript><img src="</noscript><img src=1 onerror=alert()">
  3. Steal cookies with using debug.js and set parent's name to cookies and do redirect with meta tag
  4. Send window.name to your webhook.
@parrot409
parrot409 / lmao
Created November 12, 2021 15:41
sdfsdf
lmao
@parrot409
parrot409 / index.html
Created November 12, 2021 15:48
oh yesa
f
sdfsdf
<script>
document.location = "https://webhook.site/01b6b49c-2e31-4fa4-8e0d-f87f208586e4"
</script>
@parrot409
parrot409 / rem.html
Last active December 14, 2021 14:11
X-note writeup - SECCON CTF 2021
<html>
<head>
<title>rem rem rem</title>
</head>
<body>
<div id="atk">
</div>
<script>
// const TARGET = "http://localhost:8000"
@parrot409
parrot409 / rem.php
Created December 27, 2021 17:09
SCTF 2021 - christmas-wishes
<?php
function conv($l){
$g = unpack("C*", pack("Q",$l));
$r = "";
for($i=0;$i<8;$i++){
if($g[$i] != 0){
$r.= chr($g[$i]);
}
}
return $r;