I hereby claim:
- I am ronaldstoner on github.
- I am forwardsecrecy (https://keybase.io/forwardsecrecy) on keybase.
- I have a public key ASC1KA0eOkgPqTfdyCeOHLrJjFldLcjrGz4Jz6pFw4-Ejwo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
$clear; echo "BTC: "`curl -s https://api-pub.bitfinex.com/v2/ticker/tBTCUSD|cut -d "[" -f 2|cut -d "," -f 1`|toilet -f ascii9 |boxes -d cat -a hc -p h8|lolcat -a -d 3; while sleep 10; do clear; echo "BTC: "`curl -s https://api-pub.bitfinex.com/v2/ticker/tBTCUSD|cut -d "[" -f 2|cut -d "," -f 1`|toilet -f ascii9|boxes -d cat -a hc -p h8|lolcat -a -d 3; done |
from Crypto.Cipher import AES | |
key = [0x6d, 0x79, 0x80, 0xb9, 0xa5, 0x0a, 0x97, 0x24, 0x0d, 0x2d, 0xfc, 0x36, 0x0d, 0x95, 0x55, 0xaa] | |
ciphertext = [0xf7, 0xfe, 0x1a, 0x80, 0x36, 0x51, 0x38, 0x90, 0xa0, 0x34, 0x11, 0x6d, 0x30, 0x5e, 0x52, 0x54] | |
key_bytes = bytes(key) | |
ciphertext_bytes = bytes(ciphertext) | |
aes = AES.new(key_bytes, AES.MODE_ECB) | |
result = aes.decrypt(ciphertext_bytes).decode('utf-8') |
package main | |
import ( | |
"fmt" | |
"strconv" | |
"strings" | |
) | |
var base [9][9]int | |
var preset = make(map[int]bool) |
#!/usr/bin/env python | |
from Crypto.PublicKey import RSA | |
from Crypto.Hash import SHA | |
n = 0xbb58dbdfd19995687d5cfa4e1e669a64462b6cda9ae8a31fe04db5d4d624959cadb91050cbbd73388f15f4eee2d760b88638680338fc2675e4a45babef0df33cb8a6541fc1f8a7d0ab77e8e58a96cd5862d3a2eeb82bf21b091648edcadac3321f72122a53ca97257386bffda9e1d1da06c55caeaca3cac75e9646812264e538a6b98e326fe4cd8e97e2e2cad02327a954f0a3102b389fe222f78d5cfbb296db049c01493b32e304c6e2ae36fbca79365d8507aafd909dd28b5ab1c05793d1a6b01c747950731bcffde079bef5e825790bb50ea2e7fc7668bda01cc886ea8ee9ee07f2a833be832128e199c691ca2a5a7c4266faef7f8cf1c01bef1d2d4b9c5abfb4e03f62005044b795c1036bb759a68be3f78fee1479991f503b11fc622969b6d7d0258ffbf005e8f8626d1024c52c9ef34723f526af3da9dc92255ba6c7066628fdec13b9a88d36f6d37d130c5ff6eeffaf31556d733c8041dc9b0c7ce3f1a8a71e7d923f7c934ce9e3353b865af21cb3741ae1bbfbf1ecd398ba1fa6c64ba116dcc79155d985ee89aa3c7b30ff581b883a50d986a462a1db372cdf31ee0350a3ccc39b0634679e2869cd9d3e0214af502f9c36c419dab20b225122b9d690b14c5ddcb61892d214c93eaecc0e44a12da230 |
#!/usr/bin/env python3 | |
import Crypto | |
from Crypto.PublicKey import RSA | |
import sys | |
try: | |
with open("key",'r') as f: | |
key = RSA.importKey(f.read()) | |
except: | |
rng = Crypto.Random.new().read |
# ARCYBER cipher text generator | |
# Modified from existing code on the internet | |
def subchar(a, b): | |
return (((ord(b)-97) - (ord(a)-97)) % 26) + 97 | |
def getkey(question, answer): | |
assert len(question) == len(answer), 'Length mismatch' | |
q = question.lower() | |
a = answer.lower() |
#!/bin/bash | |
# | |
# Shellshock Console | |
# Created by rstoner (Ron Stoner) | |
# for Hackmethod 2017 CTF challenges | |
# | |
# Replace {webserver} and {scriptname} with targets | |
which curl &>/dev/null | |
if [[ $? -ne 0 ]]; then |