If we get all printable inside the executable by using the strings command and ignore all symbol and compiler metadata what is left is:
Enter password:
FEDORAGCIPASSEASY
Success!
Error! Wrong password!
0x1337
0x133337
| import json | |
| import tkinter as tk | |
| import urllib.error | |
| import urllib.request | |
| from tkinter import ttk | |
| def get_user_info(handle): | |
| url = "https://codeforces.com/api/user.info?handles={}".format(handle) |
| import urllib.request | |
| import json | |
| import os | |
| from telegram.ext import Updater, CommandHandler | |
| def count(update, context): | |
| with urllib.request.urlopen('https://api.github.com/orgs/fedora-infra/repos') as res: | |
| repos = json.load(res) |
| import argparse | |
| import json | |
| import sys | |
| import urllib.parse | |
| import urllib.request | |
| GOOGLE_API_KEY = "AIzaSyDlTbpjDV_Zh1twcJAP5wqA5fufFd11o5o" | |
| # GOOGLE_API_URL = "https://www.googleapis.com/customsearch/v1/siterestrict" | |
| GOOGLE_API_URL = "https://www.googleapis.com/customsearch/v1" | |
| GOOGLE_SEARCH_ENGINE_ID = "009028027573556014028:bsh42hbg5d2" |
| import argparse | |
| import json | |
| import sys | |
| import urllib.request | |
| API_KEY = "3fa3ce845ba490db8c3e47719672ed5d0ef66739" | |
| USER_AGENT = "gci-reverse-whois/1.0" | |
| def main(argv): |
| *:8080 { | |
| gzip | |
| tls self_signed | |
| root /usr/share/caddy | |
| } | |
| import caddy.conf.d/*.conf |
| import argparse | |
| import sys | |
| from PIL import Image | |
| def encode_subcommand(args): | |
| im = Image.open(args.input_image) | |
| pixels = im.load() | |
| data = args.data.encode('ascii') + b'\0' |
| import argparse | |
| import hashlib | |
| import sys | |
| HASH_ALGORITHIMS = ["md5", "sha1", "sha224", "sha256", "sha384", "sha512"] | |
| def hash_subcommand(args): | |
| h = hashlib.new(args.algorithim) | |
| h.update(args.string.encode('ascii')) |
| import socket | |
| import io | |
| def main(): | |
| HOST, PORT = "localhost", 5000 | |
| sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) | |
| sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1) |
If we get all printable inside the executable by using the strings command and ignore all symbol and compiler metadata what is left is:
Enter password:
FEDORAGCIPASSEASY
Success!
Error! Wrong password!
0x1337
0x133337
| server { | |
| listen *:8080; | |
| server_name localhost; | |
| root /tmp/data; | |
| autoindex on; | |
| } |