Skip to content

Instantly share code, notes, and snippets.

@x0nu11byt3
x0nu11byt3 / fsec_solve.py
Created July 7, 2023 06:48 — forked from LiveOverflow/fsec_solve.py
Fsec2017 z3 solution
from z3 import *
import struct
# calculate e,f,d for a given input password
def calc(m):
e = 0
f = 0
d = 0
for i in xrange(0, len(m)):
c = ord(m[i])
This is a collection of NFO templates from various PSP Crack / Warez Groups
--- 4Fun
▄▀ ▄▄█▓▄ ____________________ __________ ▄▓█▄▄ ▀▄
▐█ ███▀██▓▄ / | \_ _____/ | \ \@TiLK ▄▓██▀███ █▌
▓██▀ ░▐█▓▓ / | || __) | | / | \ ▓▓█▌░ ▀██▓
▀█▓ ░▐█▓▌ / ^ / \ | | / | \ ▐▓█▌░ ▓█▀
▀▀ ▄██▓ \____ |\___ / |______/\____|__ / ▓██▄ ▀▀
▄██▓▀ ▄▀ |__| \/ \/ ▀▄ ▀▓██▄
@x0nu11byt3
x0nu11byt3 / elf_format_cheatsheet.md
Created February 27, 2021 05:26
ELF Format Cheatsheet

ELF Format Cheatsheet

Introduction

Executable and Linkable Format (ELF), is the default binary format on Linux-based systems.

ELF

Compilation

@x0nu11byt3
x0nu11byt3 / harekaze_mini_ctf_2020.md
Created February 27, 2021 05:24 — forked from farazsth98/harekaze_mini_ctf_2020.md
Harekaze mini CTF 2020

I played Harekaze Mini CTF 2020 for about 3 hours this weekend. The pwn challenges were nice (I especially enjoyed nm-game-extreme). Here are some short writeups.

shellcode

The program just tells you to provide shellcode that will execute execve("/bin/sh", NULL, NULL). It gives you the address of the "/bin/sh" string, so you just create shellcode to do the job and send it:

#!/usr/bin/env python3

from pwn import *
@x0nu11byt3
x0nu11byt3 / resources.md
Created August 21, 2020 00:15 — forked from muff-in/resources.md
A curated list of Assembly Language / Reversing / Malware Analysis -resources

Assembly Language / Reversing / Malware Analysis -resources

Twitter: Muffin

⭐Assembly Language