Skip to content

Instantly share code, notes, and snippets.

View convert_privkey_to_bvx.py
import hashlib, sys
b58ab = "123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz"
def b58csum(s):
return hashlib.sha256(hashlib.sha256(s).digest()).digest()[0:4]
def b58decode(s, checksum=True):
idx = 0
while s[idx] == "1":
View recover.py
import hashlib, itertools, json, socket, ssl, sys
words = [ "like", "just", "love", "know", "never", "want", "time", "out",
"there", "make", "look", "eye", "down", "only", "think", "heart", "back",
"then", "into", "about", "more", "away", "still", "them", "take", "thing",
"even", "through", "long", "always", "world", "too", "friend", "tell",
"try", "hand", "thought", "over", "here", "other", "need", "smile",
"again", "much", "cry", "been", "night", "ever", "little", "said", "end",
"some", "those", "around", "mind", "people", "girl", "leave", "dream",
"left", "turn", "myself", "give", "nothing", "really", "off", "before",
View loader04_01.asm
;
; +-------------------------------------------------------------------------+
; | This file has been generated by The Interactive Disassembler (IDA) |
; | Copyright (c) 2015 Hex-Rays, <support@hex-rays.com> |
; | License info: 48-B611-7234-BB |
; | Doskey Lee, Kingsoft Internet Security Software |
; +-------------------------------------------------------------------------+
;
View c64diskreader_cleaned.py
import struct, sys, cStringIO, os
from edoslib import *
def decodebits(s):
cs = cStringIO.StringIO(s)
res = ""
while True:
t = "01"
View tapgenerator_treasureislanddizzy.py
import struct, sys
p = ("\x2f\x43", "\x43\x2f")
pnewdata = "\x57\x43"
penddata = "\x57\x2f"
def add_kernel_byte(c):
s = pnewdata
c = ord(c)
View tapgenerator_overlander.py
import struct, sys
p = ("\x2f\x43", "\x43\x2f")
pnewdata = "\x57\x43"
penddata = "\x57\x2f"
def add_kernel_byte(c):
s = pnewdata
c = ord(c)
View edoslib.py
import sys
def decryptheader(header):
sbox_i = [126, 64, 19, 187, 247, 222, 80, 197, 245, 163, 169, 189, 193, 28, 143, 161, 182, 116, 145, 18, 70, 156, 178, 218, 148, 219, 39, 147, 229, 77, 48, 158, 127, 96, 216, 61, 160, 231, 49, 190, 107, 0, 35, 238, 29, 71, 121, 117, 85, 8, 78, 202, 241, 146, 214, 150, 184, 2, 76, 20, 164, 138, 86, 68, 3, 93, 13, 38, 246, 170, 152, 5, 135, 242, 133, 69, 103, 207, 82, 172, 59, 154, 209, 58, 253, 132, 129, 221, 115, 217, 66, 235, 185, 100, 255, 168, 237, 249, 4, 7, 94, 244, 124, 205, 114, 102, 21, 130, 191, 165, 42, 63, 142, 113, 41, 65, 16, 12, 118, 120, 125, 83, 180, 79, 112, 72, 24, 43, 149, 25, 95, 233, 227, 228, 141, 234, 192, 203, 62, 47, 105, 131, 111, 239, 14, 232, 87, 208, 155, 92, 136, 22, 140, 6, 27, 212, 26, 40, 55, 37, 188, 199, 123, 162, 52, 201, 99, 215, 195, 176, 32, 196, 15, 250, 53, 81, 60, 194, 10, 84, 122, 31, 119, 75, 98, 179, 134, 1, 34, 128, 88, 89, 45, 109, 151, 252, 226, 240, 17, 139, 175, 67, 166, 224, 91, 230, 36, 213, 159, 211, 198, 137, 200,
View preview.py
import socket, struct, os, binascii, base64
import telnetlib
from pow import *
def readline(sc, show = True):
res = ""
while len(res) == 0 or res[-1] != "\n":
data = sc.recv(1)
if len(data) == 0:
View shellql.py
import requests, time, os
ss = "X"
for index in xrange(len(ss), 200):
s = ""
for i in xrange(8):
data = open("template.asm", "rb").read()
data = data.replace("{bitmask}", str(1 << i))
View recover_blockchain_info_phrase.py
import struct, sys
mn_v2_words = [
"like", "just", "love", "know", "never", "want", "time", "out", "there",
"make", "look", "eye", "down", "only", "think", "heart", "back", "then",
"into", "about", "more", "away", "still", "them", "take", "thing", "even",
"through", "long", "always", "world", "too", "friend", "tell", "try",
"hand", "thought", "over", "here", "other", "need", "smile", "again",
"much", "cry", "been", "night", "ever", "little", "said", "end", "some",
"those", "around", "mind", "people", "girl", "leave", "dream", "left",