Skip to content

Instantly share code, notes, and snippets.

View SGX_pwn.html
<!DOCTYPE html>
<html>
<head>
<title>SGX PWN</title>
</head>
<body>
<h1>PWN!!!</h1>
<script type="text/javascript">
function print(text)
{
View virtualbox_3d_exp.py
# Author : peternguyen93
import sys
sys.path.append('../') # back to vboxlib module
from vboxlib.hgcm import *
from vboxlib.chromium import *
from ctypes import *
'''
View wwtv
import socket
import time
import re
from Pwning import *
pl = Payload()
def get_socket(host, port):
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, port))
View ghost_in_the_heap.py
#!/usr/bin/python
# Author : peternguyen
from Pwn import *
# p = Pwn(mode=1,port=8887)
p = Pwn(mode=1,host='52.193.196.17',port=56746)
def select(op):
p.read_until('Your choice: ')
View shellcode_maker.py
from keystone import *
from capstone import *
from unicorn import *
from unicorn.x86_const import *
from struct import *
from termcolor import *
import os
import sys
View 3pigs.py
#!/usr/bin/python
# Author : peternguyen
from struct import *
from base64 import b64encode,b64decode
import requests
import re
import hashlib
import random
View bypass.py
target = 'UOTp%I()<>S'
out = ''
for c in target:
found = False
for func_name in dir("")[::-1]:
try:
doc = getattr(getattr("",func_name),"__doc__")
if c in doc:
idx = doc.find(c)
out += "{0.%s.__doc__[%d]}" % (func_name,idx)
View mute_pig.py
#!/usr/bin/python
# Author : peternguyen
from Pwn import *
p = Pwn(mode=1,host='47.75.128.158',port=9999)
def alloc(name,type):
p.sendint(1)
p.sendint(type)
View python_revenge_exploit.py
import requests
import cPickle
import sys
import os
import hashlib
from base64 import b64encode, b64decode
import string
import json
import flask
View WhiteHat2017_objdump.py
from Pwn import *
p = Pwn(mode=1)
def pA32(*args):
binary = ''
for arg in args:
binary += p.p32(arg)
return binary