Skip to content

Instantly share code, notes, and snippets.

View hugsy's full-sized avatar
:octocat:
‎just hacking on

crazy hugsy hugsy

:octocat:
‎just hacking on
View GitHub Profile
#!/usr/bin/env python2
#
# beatmeonthedl Baby's First, 324 points'
# I really like to be beaten but keep it on the dl.
# Connect to:
# beatmeonthedl_498e7cad3320af23962c78c7ebe47e16.quals.shallweplayaga.me 6969
#
#
from pwn import *
@hugsy
hugsy / bigpicture.py
Last active May 10, 2017 20:49
PlaidCTF 2017 - bigpicture [pwn 200]
#!/usr/bin/env python2
#
#
# bigpicture [pwn 200] PlaidCTF 2017
#
# $ ./bigpicture.py bigpicture.chal.pwning.xxx 420
# [+] Opening connection to bigpicture.chal.pwning.xxx on port 420: Done
# [*] Starting '/ctf/plaidctf_2017/bigpicture/bigpicture' remotely
# [*] leaking libc
# [+] libc_addr = 0x7ff7b167ac70

Keybase proof

I hereby claim:

  • I am hugsy on github.
  • I am hugsy (https://keybase.io/hugsy) on keybase.
  • I have a public key ASAk2OzRftLhep2ooIFPk2HLJdc3r_HQy6DPwtanNCyjHAo

To claim this, I am signing this object:

@hugsy
hugsy / gist:b028f7268ca90f4a51640b28e0f04116
Last active November 15, 2017 19:40
csaw 2016 - hungman - pwn 300
#
# csaw 2016 - hungman - pwn 300
#
# @_hugsy_ & @rick2600
#
from pwn import *
context.update(arch="amd64", os="linux", log_level = "info")
import random, string, time
@hugsy
hugsy / gist:c83db6802955ca3511904228ad26a274
Last active October 3, 2016 14:34
CSAW - rock - rev 100
# @_hugsy_
# $ python bf.py
# Pass 0
# [...]
# Pass 27
# Pass 28
# Pass 29
# /////////////////////////////////
# Do not be angry. Happy Hacking :)
# /////////////////////////////////
@hugsy
hugsy / gist:3d983e103056372d838e6ee2d3fbfba4
Last active October 3, 2016 14:34
CSAW 2016 - pwn 200 - tutorial
#
# CSAW 2016 - pwn 200 - tutorial
#
# @_hugsy_
#
# tutorial@9c7e30ba54b6:/home/tutorial$ ls
# ~/cur/tutorial $ py xpl.py
# [+] Opening connection to pwn.chal.csaw.io on port 8002: Done
# [*] Got 0x7f60e48eb860
# [*] libc is 0x7f60e487c000
@hugsy
hugsy / gist:edb4bbbb63fde3a2a49ec52845b372c4
Created September 6, 2016 01:25
TWCTF 2016 - reverse_box
#!/usr/bin/python
#
# @_hugsy_
#
# $ python /tmp/uni.py
# >>> init randint is d6
# The flag is TWCTF{5UBS717U710N_C1PH3R_W17H_R4ND0M123D_5-B0X}
#
import unicorn
@hugsy
hugsy / gist:32e4fdf200dd471defc9e32dda4891e7
Last active September 14, 2016 13:53
CTF(x) 2016 dat-boinary
#!/usr/bin/python2
# [+] Opening connection to 172.28.128.3 on port 1338: Done
# [*] Smash null byte
# [*] Reading from memory
# [*] Leaked puts@glibc at 0xb7665650
# [*] system@glibc is at 0xb7640190
# [*] Overwriting puts@got with system@glibc
# [*] Triggering
# [*] Switching to interactive mode
@hugsy
hugsy / english-adjectives.txt
Last active August 29, 2020 20:22
Codename generator
abandoned
able
absolute
adorable
adventurous
academic
acceptable
acclaimed
accomplished
accurate
@hugsy
hugsy / armpwn-exploit.py
Last active March 24, 2021 06:08
ARMpwn challenge exploit
#!/usr/bin/env python2
#
# ARMpwn challenge exploit (kudos & thx to 5aelo)
#
# writeup: https://blahcat.github.io/2016/06/13/armpwn-challenge/
#
# @_hugsy_
#
from pwn import *