Skip to content

Instantly share code, notes, and snippets.

View test.php
<?php
phpinfo();
?>
View solver.py
# for ( i = 0LL; i <= 0xC0DE41; ++i )
# {
# v3 = divide(i, 0x29uLL);
# v4 = pow(v3, 3uLL);
# v5 = add_numbers(v4, v9);
# v6 = multiply(v5, i);
# v9 = mod(v6, 0x41DEADBABEC0FFEEuLL);
# }
import psyco; psyco.full()
View stego300-simone.py
import struct
from PIL import Image, ImageDraw
data = open("simone.wav.raw", "rb").read()
im = Image.new("RGB", (1000, 1000))
draw = ImageDraw.Draw(im)
prev = None
View websockets_stuff.py
import websocket, random
def encode_unicode(n):
s = ""
if n <= 0x7f:
s = chr(n)
elif n <= 0x7ff:
s = chr(0xc0 | ((n & 0x7c0) >> 6)) + chr(0x80 | ((n & 0x3f) >> 0))
elif n <= 0xffff:
s = chr(0xe0 | ((n & 0xf000) >> 12)) + chr(0x80 | ((n & 0xfc0) >> 6)) + chr(0x80 | ((n & 0x3f) >> 0))
View tom_and_jerry.py
import binascii, struct
from PIL import Image
f = open("mousestuff.pcap", "rb")
f.read(0x18)
im = Image.new("RGB", (1024, 1024))
View solve_with_z3.py
from z3 import *
import binascii, struct
def decrypt(data0, data1):
# inverted key schedule for decryption
key0 = 0x0a728e203850a80e
key1 = 0x1b8e2679ccaef6b4
for round in xrange(31, -1, -1):
View BLES00932.md5
This file has been truncated, but you can view the full file.
; SlavaSoft Optimizing Checksum Utility - fsum 2.52.00337 <www.slavasoft.com>
;
; Generated on 03/11/17 at 22:07:35
;
5f6d977f482d801d036b69cdc934686f *PS3_GAME\TROPDIR\NPWR01249_00\TROPHY.TRP
b103618357be9a6546139a62a8de7201 *PS3_GAME\USRDIR\chr\c0000\c0000.anibnd
f66395bf956d8e063ce1a67aff3131a0 *PS3_GAME\USRDIR\chr\c0000\c0000.anibnd.dcx
17eb2f774f915f66914ae7938760d0a2 *PS3_GAME\USRDIR\chr\c0000\c0000.chrbnd
4988062d80a5552a31b82eb60b69b1cb *PS3_GAME\USRDIR\chr\c0000\c0000.chrbnd.dcx
View time_is_exploit.py
import socket, struct, os, binascii, base64, hashlib
import telnetlib
import psyco; psyco.full()
def readline(sc, show = True):
res = ""
while len(res) == 0 or res[-1] != "\n":
data = sc.recv(1)
if len(data) == 0:
View solve_mat2.py
import struct
s = "W"
x = 0xDEADBEEF
for n in 0x0FF6FEAFE, 0x0CDAF4DB6, 0x8D9A9B17, 0x83A147A7, 0x7AD24DCA, 0x0C99CA1B9, 0x71CEAC15, 0x932C2931:
x ^= n
s += struct.pack("<I", x)
x = n
s2 = "W"
View solve-PKI.py
import socket, struct, os, binascii, base64, hashlib, random
import telnetlib
from task import *
def readline(sc, show = True):
res = ""
while len(res) == 0 or res[-1] != "\n":
data = sc.recv(1)
if len(data) == 0: