Skip to content

Instantly share code, notes, and snippets.

View icheernoom's full-sized avatar
😆
Focusing

ICheer_No0M icheernoom

😆
Focusing
View GitHub Profile
@icheernoom
icheernoom / web300.py
Last active August 29, 2015 14:19
Python script to solve "Web B" challenge in CCTF 2015
#!/usr/bin/python
# Author: Kitwipat Towattana (@icheernoom)
import urllib, urllib2, string, re, sys
def minus(num):
return float(num[0]) - float(num[1])
url_check = 'http://web.camsctf.com/b/check.php'
@icheernoom
icheernoom / prog250.py
Created April 22, 2015 10:19
Python script to solve "Python 2" challenge in CCTF 2015
#!/usr/bin/python
# Author: Kitwipat Towattana (@icheernoom)
import hashlib
from PIL import Image
md5 = []
width = 300
height = 300
for i in range(0,10):
@icheernoom
icheernoom / search.pl
Created February 3, 2015 14:44
Search String in Files on Directory and Subdirectory
use File::Find;
print "\n\n\t### Search String in Files on Directory and Subdirectory By ICheer_No0M ###\n\n";
print 'Path File : ';
chomp($path=<stdin>);
print 'Search Keyword : ';
chomp($string=<stdin>);
$keyword = AddSlashes($string);
find(\&file_names, $path);
sub file_names {
#!/usr/bin/perl
# hb_honeypot.pl -- a quick 'n dirty honeypot hack for Heartbleed
#
# This Perl script listens on TCP port 443 and responds with completely bogus
# SSL heartbeat responses, unless it detects the start of a byte pattern
# similar to that used in Jared Stafford's ([email protected]) demo for
# CVE-2014-0160 'Heartbleed'.
#
# Run as root for the privileged port. Outputs IPs of suspected heartbleed scan
@icheernoom
icheernoom / prog100.py
Last active August 29, 2015 14:11
Python script to solve "Choose the number" challenge in SECCON CTF 2014.
#!/usr/bin/python
# Author: Kitwipat Towattana (@icheernoom)
import socket, re
def get_data(recv):
m = re.match("(.+)\nThe", recv)
return m
def get_num(m):
@icheernoom
icheernoom / slideshare.pl
Last active August 28, 2017 04:13
Save all slide in slideshare.net to image.
use LWP::UserAgent;
if(@ARGV < 2){
print "Usage : filename.pl <slideshare_url> <folder_name>";
exit;
}
$url = $ARGV[0];
$folder = $ARGV[1];
$browser = LWP::UserAgent->new() or die;
$content = $browser->get($url)->content;
@icheernoom
icheernoom / spamsmf.pl
Created December 24, 2013 15:51
Get image link from picpost.mthai.com and auto post into SMF Forum.
use LWP::UserAgent;
use HTTP::Cookies;
$user='admin';
$password='1234';
$target = 'http://localhost/smf2/';
$ua = LWP::UserAgent->new() or die;
$cookie_jarr = HTTP::Cookies->new();
$ua->cookie_jar( $cookie_jarr );
$resr = $ua->post($target.'index.php?action=login2',