I hereby claim:
- I am xermicus on github.
- I am xermic (https://keybase.io/xermic) on keybase.
- I have a public key whose fingerprint is DBBF E288 93F0 32CA D1FB B554 B7A0 A849 3D39 67B6
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
# http://crackmes.de/users/fr0gsek/fr0g_kgm1/ | |
key = 'SeRiAlAbCdEfGhIjKlMnOpQrStUvWxYz'[::-1] | |
user = '' | |
while len(user) < 5: | |
user = input('login [min 5 chars]: ') | |
serial = '' | |
for i in range(32): |
# http://crackmes.de/users/damo2k/damos_crackme_1_for_linux/ | |
import random, sys | |
random.seed() | |
serial = [None] * 10 | |
#1_10 | |
c = random.randint(0x64, 0x7a) | |
serial[9] = chr(c) |
## Command Mode | |
pdf @ main | |
-> print disassembly from main function | |
afl | |
-> list all functions | |
iz; izz | |
-> list strings; list more strings |
# http://crackmes.de/users/macabre/rccrackme/ | |
# NOTE: This keygen finds correct serial, but fails to insert the hyphens '-' in the | |
# correct (correct in terms of the crackme) way. It gave me headaches trying | |
# to do this in python, but I think it should be easy to implement it in C. | |
user = input("Enter username: ") | |
user *= 9 // len(user) + 1 if len(user) < 10 else 1 | |
print('User: ' + user) |
# http://crackmes.de/users/pancake/pcme0/ | |
# This is not perfect, it fails to recover one specific char in the flag | |
# Idk what's going on there, but found it out anyway :) | |
# (In the final flag, the non-printable char '\0x18' should be '0'. Flag is 10 chars long.) | |
import sys,r2pipe | |
r2profile = '#!/usr/bin/rarun2\nprogram=./pcme0\nstdin=stdin.txt\nstdout=' | |
with open('profile.rr2', 'w') as f: |
# http://crackmes.de/users/geyslan/crackme.02.32/ | |
import random | |
random.seed() | |
password = '' | |
secret = '\xf7\xf8\xf1\xf4\xf1\xf8\xb3\xfc\xfc' | |
for i in range(len(secret)): | |
candidates = '' |
This was a very fun crackme! Instead of providing a simple "password: " prompt or something like that the author actually wrote a tiny game to play with. | |
# ./spacemision | |
Hello, ...? | |
Hello, chief reverse engineer root of the spaceship rbinsegfaulter? | |
Can you hear, me? | |
Oh, these speakers seem to be broken. | |
No matter, if you hear me, or not, this is probably our last chance to survive! | |
We got attacked from the evil aliens from the binja-system! |
Description='netctl profile for hslu' | |
Interface=wlp3s0 | |
Connection=wireless | |
Security=wpa-configsection | |
ESSID=hslu | |
IP=dhcp | |
WPAConfigSection=( | |
'ssid="hslu"' | |
'proto=RSN' | |
'key_mgmt=WPA-EAP' |
#!/bin/bash | |
# Example for DMATH. | |
# Adapt the "ref_XXXXXXX" for other subjects (it's the same as the web URI while browsing): | |
sudo mount -t davfs https://elearning.hslu.ch/ilias/webdav.php/hslu/ref_3779056/ /mnt/ilias/DMATH |