mitmproxy is an excellent console app written in Python.
It is easy to use on Linux and OS X.
It has an easy to use, prebuilt binary for OS X Mountain Lion (also works on OS X Mavericks).
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <dirent.h> | |
| #include <string.h> | |
| struct EnvInfo | |
| { | |
| char home[128]; | |
| char username[128]; | |
| char shell[128]; | |
| char path[128]; |
| RED="\033[0;31m" | |
| YELLOW="\033[0;33m" | |
| GREEN="\033[0;32m" | |
| BLUE="\033[0;34m" | |
| LIGHT_GRAY="\033[0;37m" | |
| COLOR_NONE="\033[0;0m" | |
| RE_GIT_BRANCH="^On branch ([^${IFS}]*)" | |
| RE_GIT_REMOTE="Your branch is (.*) '" | |
| RE_GIT_GAP="Your branch is .* ([0-9]+) commits?" |
| #!/usr/bin/python | |
| """ | |
| Exploit for Samba vulnerabilty (CVE-2015-0240) by sleepya | |
| The exploit only targets vulnerable x86 smbd <3.6.24 which 'creds' is controlled by | |
| ReferentID field of PrimaryName (ServerName). That means '_talloc_zero()' | |
| in libtalloc does not write a value on 'creds' address. | |
| Reference: | |
| - https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/ |
| In [23]: def find_offsets(filename, regex): | |
| ...: with open(filename) as ifile: | |
| ...: lineno = 1 | |
| ...: for line in ifile: | |
| ...: for result in regex.finditer(line): | |
| ...: print "Result found line %d column %d" % (lineno, result.start()) | |
| ...: lineno += 1 | |
| ...: | |
| In [24]: r = re.compile('=') |
| #!/bin/bash | |
| # | |
| # Batch VCS repositories update script. | |
| # Finds all git/svn/mercurial repositories recursively | |
| # and updates them. | |
| # | |
| # USAGE: | |
| # ./update.sh [PATH] | |
| # | |
| # PATH |
mitmproxy is an excellent console app written in Python.
It is easy to use on Linux and OS X.
It has an easy to use, prebuilt binary for OS X Mountain Lion (also works on OS X Mavericks).
I hereby claim:
To claim this, I am signing this object:
| #include <stdio.h> | |
| #include <stdlib.h> | |
| char username[512] = {1}; | |
| void (*_atexit)(int) = exit; | |
| void cp_username(char *name, const char *arg) | |
| { | |
| while((*(name++) = *(arg++))); | |
| *name = 0; | |
| } | |
| int main(int argc, char **argv) |
| #include <stdio.h> | |
| #include <unistd.h> | |
| int main(int argc, char *argv[]){ | |
| FILE *secret = fopen("/challenge/binary/binary5/.passwd", "rt"); | |
| char buffer[32]; | |
| fgets(buffer, sizeof(buffer), secret); | |
| printf(argv[1]); | |
| fclose(secret); | |
| return 0; | |
| } |
| (21:09:37)[mdeous@DELL-P159BIS:~/Dotfiles(master)↑+2⚡]0↩ | |
| $ CURSEUR ICI |