Skip to content

Instantly share code, notes, and snippets.

View intrd's full-sized avatar
🚫
Become a ghost

intrd

🚫
Become a ghost
View GitHub Profile
@intrd
intrd / simone_plot.py
Last active March 2, 2018 15:47
Python script to plot WAV file into a image stego300-simone_entao_e_natal @ 3dsctf-2k16
## Python script to plot WAV file into a image stego300-simone_entao_e_natal @ 3dsctf-2k16
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
from scipy.io import wavfile
from matplotlib import pyplot as plt
import numpy as np
samplerate, data = wavfile.read('sim.wav')
#print a #to print freq values
@intrd
intrd / get_started_exploit_pwntools.py
Last active February 17, 2018 18:28
Buffer overflow using Pwntools to exploit rev200-get_started @ 3dsctf-2k16
## Buffer overflow using Pwntools to exploit rev200-get_started @ 3dsctf-2k16
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
from pwn import *
context(arch = 'i386', os = 'linux', endian = 'little', word_size = 32, log_level = 'debug')
#context(arch = 'i386', os = 'linux', endian = 'little', word_size = 32)
binary = './get_started'
@intrd
intrd / not_the_same_exploit_pwntools.py
Last active March 3, 2017 06:00
Buffer overflow using Pwntools to exploit pwn200-not_the_same @ 3dsctf-2k16
## Buffer overflow using Pwntools to exploit pwn200-not_the_same @ 3dsctf-2k16
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
import sys
from pwn import *
context(arch = 'i386', os = 'linux', endian = 'little', word_size = 32)
#context(arch = 'i386', os = 'linux', endian = 'little', word_size = 32, log_level = 'debug')
@intrd
intrd / updating_ghost.txt
Last active March 3, 2017 06:00
Updating Ghost, Nodejs and Npmjs (any ver, works errorproof!)
## Updating Ghost, Nodejs and Npmjs (any ver, works errorproof!)
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
Just for note.. '#'' is root and '$' is prod user
$ forever list
$ forever stop 0
# wget https://ghost.org/zip/ghost-latest.zip
# mv ghost ghost_bk
@intrd
intrd / alien_dna1.py
Last active March 3, 2017 06:00
Script to correctly answer prog100-alien_dna1 @ 3dsctf-2k16
## Script to correctly answer prog100-alien_dna1 @ 3dsctf-2k16
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
# int_netcat.py - https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a
import socket, re, sys
sys.path.append("../../LIBS/")
from int_netcat import Netcat
@intrd
intrd / alien_dna2.py
Last active March 3, 2017 06:00
Script to correctly answer prog200-alien_dna2 @ 3dsctf-2k16
## Script to correctly answer prog200-alien_dna2 @ 3dsctf-2k16
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
# int_netcat.py - https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a
import socket, re, sys, time, operator, difflib
sys.path.append("../../LIBS/")
from int_netcat import Netcat
@intrd
intrd / get_started_exploit.py
Last active March 3, 2017 06:00
Buffer overflow using netcat.py to exploit rev200-get_started buffer @ 3dsctf-2k16
#!/usr/bin/python
## Buffer overflow using netcat.py to exploit rev200-get_started buffer @ 3dsctf-2k16
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
# int_netcat.py - https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a
import sys, socket, struct
sys.path.append("../../LIBS/")
from int_netcat import Netcat
#!/usr/bin/python
## Exploiting python cpickle - pwn300-bubble_bass @ 3dsctf-2k16
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
# int_netcat.py - https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a
# int_caesar.py - https://gist.github.com/intrd/2c19d329885dfee9fc70c38910394a7d
import re, sys, os, subprocess, cPickle
sys.path.append("../../LIBS/")
@intrd
intrd / not_the_same.py
Last active January 19, 2020 00:39
Buffer overflow using netcat.py to exploit pwn200-not_the_same @ 3dsctf-2k16
#!/usr/bin/python
## Buffer overflow using netcat.py to exploit pwn200-not_the_same @ 3dsctf-2k16
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
# int_netcat.py - https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a
import sys, struct
from int_netcat import Netcat
@intrd
intrd / cryptoquizz.py
Last active March 3, 2017 05:59
Parser to crypto50-cryptoquizz @ insomni'hack 2017
#!/usr/bin/python
## Parser to crypto50-cryptoquizz @ insomni'hack 2017
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
# int_wiki.py - https://gist.github.com/intrd/2c19ee22c3bd98ed07612c6ad3adc25d
# int_netcat.py - https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a
import re, sys, string, time
sys.path.append("../../LIBS/")