Skip to content

Instantly share code, notes, and snippets.

import struct, sys
p = ("\x2f\x43", "\x43\x2f")
pnewdata = "\x57\x43"
penddata = "\x57\x2f"
def add_kernel_byte(c):
s = pnewdata
c = ord(c)
import struct, sys
p = ("\x2f\x43", "\x43\x2f")
pnewdata = "\x57\x43"
penddata = "\x57\x2f"
def add_kernel_byte(c):
s = pnewdata
c = ord(c)
import struct, sys
p = ("\x30\x42", "\x42\x30")
pnewdata = "\x56\x42"
penddata = "\x56\x30"
def add_kernel_byte(c):
s = pnewdata
c = ord(c)
A02 AMSTRAD 464/6128 | 3 INCH DISK 150
A35 ATARI ST | 3.5 INCH DISK 268
A36 AMIGA | 3.5 INCH DISK 245
A37 PC COMPATIBLE | 3.5 INCH DISK 218
A42 AMSTRAD 464/6128 | CASSETTE / K7 414
A43 SPECTRUM 48K/128K/+ | CASSETTE / K7 425
A44 COMMODORE 64/128 | CASSETTE / K7 373
A48 MSX | CASSETTE / K7 11
A54 COMMODORE 64/128 | 5.25 INCH DISK 94
A57 PC COMPATIBLE | 5.25 INCH DISK 216
import sys
def decryptheader(header):
sbox_i = [126, 64, 19, 187, 247, 222, 80, 197, 245, 163, 169, 189, 193, 28, 143, 161, 182, 116, 145, 18, 70, 156, 178, 218, 148, 219, 39, 147, 229, 77, 48, 158, 127, 96, 216, 61, 160, 231, 49, 190, 107, 0, 35, 238, 29, 71, 121, 117, 85, 8, 78, 202, 241, 146, 214, 150, 184, 2, 76, 20, 164, 138, 86, 68, 3, 93, 13, 38, 246, 170, 152, 5, 135, 242, 133, 69, 103, 207, 82, 172, 59, 154, 209, 58, 253, 132, 129, 221, 115, 217, 66, 235, 185, 100, 255, 168, 237, 249, 4, 7, 94, 244, 124, 205, 114, 102, 21, 130, 191, 165, 42, 63, 142, 113, 41, 65, 16, 12, 118, 120, 125, 83, 180, 79, 112, 72, 24, 43, 149, 25, 95, 233, 227, 228, 141, 234, 192, 203, 62, 47, 105, 131, 111, 239, 14, 232, 87, 208, 155, 92, 136, 22, 140, 6, 27, 212, 26, 40, 55, 37, 188, 199, 123, 162, 52, 201, 99, 215, 195, 176, 32, 196, 15, 250, 53, 81, 60, 194, 10, 84, 122, 31, 119, 75, 98, 179, 134, 1, 34, 128, 88, 89, 45, 109, 151, 252, 226, 240, 17, 139, 175, 67, 166, 224, 91, 230, 36, 213, 159, 211, 198, 137, 200,
import struct
bits = (0.062500000001818989403545856475830078125, 0.0156250000004547473508864641189575195312, 0.0039062500001136868377216160297393798828, 0.0009765625000284217094304040074348449707, 0.0002441406250071054273576010018587112427, 0.0000610351562517763568394002504646778107, 0.0000152587890629440892098500626161694527, 0.0000038146972657360223024625156540423632, 0.0000009536743164340055756156289135105908, 0.0000002384185791085013939039072283776477, 0.0000000596046447771253484759768070944119, 0.000000014901161194281337118994201773603, 0.0000000037252902985703342797485504434007)
s = ""
for target in (0.671565706376017, 0.682612358126820, 0.682552023325146, 0.667647300753773, 0.682310803327740, 0.670638734940470, 0.729427094105661, 0.683334092143953, 0.729182238224924, 0.682352954987467, 0.745769257191599, 0.666743217501820, 0.682352764997662, 0.670634204987467, 0.733381925616444, 0.667648012284220, 0.749690691474855, 0.682356773410023, 0.670817057136476):
target -= (0.6666666666612316235641 -
import struct, hashlib
from Crypto.Cipher import AES
class RNG(object):
def __init__(self, seed):
self.seed = (seed ^ 0x5DEECE66DL) & ((1L << 48) - 1)
def nextint(self):
self.seed = (self.seed * 0x5DEECE66DL + 0xBL) & ((1L << 48) - 1)
import socket, struct, os, binascii, base64
import telnetlib
from pow import *
def readline(sc, show = True):
res = ""
while len(res) == 0 or res[-1] != "\n":
data = sc.recv(1)
if len(data) == 0:
import requests, time, os
ss = "X"
for index in xrange(len(ss), 200):
s = ""
for i in xrange(8):
data = open("template.asm", "rb").read()
data = data.replace("{bitmask}", str(1 << i))
import socket, struct, os, binascii, base64
import telnetlib
from pow import *
def readline(sc, show = True):
res = ""
while len(res) == 0 or res[-1] != "\n":
data = sc.recv(1)
if len(data) == 0: