Do the following:
M-x package-install RET jedi
M-x jedi:install-server
and then add the following lines to ~/.emacs
:
# Drop this into ~/.local/share/nautilus-python/extensions | |
# (creating the directory if needed) and restart nautilus. | |
# | |
# Provides a new option to "Download from Clipboard" in the | |
# context menu of folders, which uses `wget` to download | |
# whatever is in the clipboard. | |
import gi | |
from gi import require_version | |
require_version('Gtk', '3.0') |
// Krautflare Solution | |
// Author: f0xtr0t | |
let early_object_only_for_addresses = [1,2,3,4,5.1]; | |
// Server/Local differences | |
const SERVER = true; | |
const FPUTC_OFFSET = SERVER ? 0x877e0n : 0x6ef10n; | |
const PRINTF_OFFSET = SERVER ? 0x64e80n : 0x4f190n; |
# Makefile to simplify Docker stuff for CODE BLUE CTF | |
# Author: Jay Bosamiya (f0xtr0t) | |
PROBLEM_NAME=todo | |
TEAM_USN=todo | |
TEAM_PASS=todo | |
TEST_FLAG="testing{flagtest}" | |
SUBMIT_TO_PROBLEM_NAME=$(PROBLEM_NAME) | |
all: |
#!/bin/bash | |
function usage() { | |
echo "Usage:" | |
echo " pdf-un-poster4 {in.pdf} [out.pdf]" | |
} | |
if [ -z "$1" ]; then | |
usage | |
exit 1 |
####################################################### | |
# A hacky interpreter for the ><+-[] language | |
# 2018 (c) Jay Bosamiya | |
####################################################### | |
####################################################### | |
# Update "program" and "cells" to whatever you chose | |
####################################################### | |
program = "INPUT PROGRAM HERE" # For example, try "+>+" |
#! /bin/bash | |
# Updated script at https://github.com/jaybosamiya/dotfiles/blob/master/random-localbin-scripts/.local/bin/fstar-profile-queries | |
set -o pipefail | |
function usage() { | |
echo "Usage:" 1>&2 | |
echo " $0 {filename.fst} [queryname]" 1>&2 | |
echo "" 1>&2 | |
echo "Useful Environment Variables:" 1>&2 |
(require 'subr-x) | |
(require 'fstar-mode) | |
(defun fstar-indent-file-to-string (file) | |
(string-trim | |
(with-temp-buffer (insert-file-contents file) | |
(buffer-string)))) | |
(defun fstar-indent-string (str) | |
(let* |
def attack_repeating_key_xor(ciphertext, keysize=None, score=None): | |
from itertools import cycle | |
def xor(enc, k): | |
return ''.join(chr(ord(a) ^ k) for a in enc) | |
def score_english(string): | |
freq = dict() | |
freq['a'] = 834 | |
freq['b'] = 154 |
Whoo! This was a fun challenge with loads to learn. :)
The given code level11.c
checks whether the two inputs (as argv[1]
and argv[2]
) both MD5 hash to the same value or not. If they do, it uses both inputs as brainfuck code, and executes them. Then it checks if the outputs differ. Upon differing outputs, they are checked against the strings "io.sts Rules!"
and "io.sts Sucks!"
. If prog1's output is the first, and prog2's output is the second, we are granted shell.