Skip to content

Instantly share code, notes, and snippets.

@ronaldstoner
ronaldstoner / keybase.md
Created August 25, 2023 17:52
keybase.md

Keybase proof

I hereby claim:

  • I am ronaldstoner on github.
  • I am forwardsecrecy (https://keybase.io/forwardsecrecy) on keybase.
  • I have a public key ASC1KA0eOkgPqTfdyCeOHLrJjFldLcjrGz4Jz6pFw4-Ejwo

To claim this, I am signing this object:

$clear; echo "BTC: "`curl -s https://api-pub.bitfinex.com/v2/ticker/tBTCUSD|cut -d "[" -f 2|cut -d "," -f 1`|toilet -f ascii9 |boxes -d cat -a hc -p h8|lolcat -a -d 3; while sleep 10; do clear; echo "BTC: "`curl -s https://api-pub.bitfinex.com/v2/ticker/tBTCUSD|cut -d "[" -f 2|cut -d "," -f 1`|toilet -f ascii9|boxes -d cat -a hc -p h8|lolcat -a -d 3; done
@ronaldstoner
ronaldstoner / solver.py
Created December 27, 2019 08:12
solver.py
from Crypto.Cipher import AES
key = [0x6d, 0x79, 0x80, 0xb9, 0xa5, 0x0a, 0x97, 0x24, 0x0d, 0x2d, 0xfc, 0x36, 0x0d, 0x95, 0x55, 0xaa]
ciphertext = [0xf7, 0xfe, 0x1a, 0x80, 0x36, 0x51, 0x38, 0x90, 0xa0, 0x34, 0x11, 0x6d, 0x30, 0x5e, 0x52, 0x54]
key_bytes = bytes(key)
ciphertext_bytes = bytes(ciphertext)
aes = AES.new(key_bytes, AES.MODE_ECB)
result = aes.decrypt(ciphertext_bytes).decode('utf-8')
@ronaldstoner
ronaldstoner / solipsis_sudoku_solver.go
Last active December 27, 2019 05:44
solipsis_sudoku_solver.go
package main
import (
"fmt"
"strconv"
"strings"
)
var base [9][9]int
var preset = make(map[int]bool)
@ronaldstoner
ronaldstoner / santas_signature_solver.py
Last active December 27, 2019 18:23
santas_signature_solver.py
#!/usr/bin/env python
from Crypto.PublicKey import RSA
from Crypto.Hash import SHA
n = 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
@ronaldstoner
ronaldstoner / santas_signature.py
Created December 27, 2019 04:33
santas_signature.py
#!/usr/bin/env python3
import Crypto
from Crypto.PublicKey import RSA
import sys
try:
with open("key",'r') as f:
key = RSA.importKey(f.read())
except:
rng = Crypto.Random.new().read
@ronaldstoner
ronaldstoner / ciphertext.py
Created August 11, 2017 14:18
ciphertext.py
# ARCYBER cipher text generator
# Modified from existing code on the internet
def subchar(a, b):
return (((ord(b)-97) - (ord(a)-97)) % 26) + 97
def getkey(question, answer):
assert len(question) == len(answer), 'Length mismatch'
q = question.lower()
a = answer.lower()
@ronaldstoner
ronaldstoner / shellshock.sh
Created June 30, 2017 19:34
shellshock.sh
#!/bin/bash
#
# Shellshock Console
# Created by rstoner (Ron Stoner)
# for Hackmethod 2017 CTF challenges
#
# Replace {webserver} and {scriptname} with targets
which curl &>/dev/null
if [[ $? -ne 0 ]]; then