Are you bored with x86? Enjoy this x87 VM.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import os | |
| os.environ['PWNLIB_NOTERM'] = '1' | |
| os.environ['TERM'] = 'linux' | |
| from pwn import * | |
| from Crypto.Util.number import long_to_bytes, bytes_to_long | |
| def message_not_define(name): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| from pwn import remote | |
| from tqdm import tqdm | |
| LOCAL = True | |
| for lucky_count in tqdm(range(5000)): | |
| print(f"trying {lucky_count=}") | |
| if LOCAL: | |
| r = remote("localhost", 5001, level="debug") | |
| else: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| CALL_OBJECT_BYTECODE = bytes.fromhex("21820000" + "000000") # CALL_OBJECT 000000?? | |
| KEYS = "1234567890QWERTYUIOPASDFGHJKL{ZXCVBNM_-}" | |
| PACKET_LEN = 192 | |
| PACKET_HEADER_LEN = 8 | |
| FLAG_LEN = 47 | |
| flag = "" | |
| for flag_i in range(FLAG_LEN): | |
| m2ts = open(f"STREAM/{flag_i:05}.m2ts", "rb").read() |
The following code is given (source).
from fielddef import FQFac
q = 115792089210356248762697446949407573529996955224135760342422259061068512044369
GF = FQFac(q)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // SPDX-License-Identifier: UNLICENSED | |
| pragma solidity ^0.8.13; | |
| import "forge-std/Test.sol"; | |
| contract SelfDestructSuccessTest is Test { | |
| function testSecure() public { | |
| Secure secure = new Secure(); | |
| Exploit exploit = new Exploit(); | |
| secure.f{value: 1 ether}(address(exploit)); |
I hereby claim:
- I am minaminao on github.
- I am minaminao (https://keybase.io/minaminao) on keybase.
- I have a public key whose fingerprint is AAD8 B9A4 548F 2BCF 66A2 DD7F CF82 B03C 4332 6D50
To claim this, I am signing this object:
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # https://github.com/Kaggle/kaggle-environments/blob/master/kaggle_environments/envs/halite/helpers.py | |
| import datetime | |
| import math | |
| from operator import pos | |
| import random | |
| import sys | |
| import time | |
| from collections import deque | |
| from heapq import heappop, heappush |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import zipfile | |
| def encode(): | |
| UserEncodingFileName = input() | |
| DirectoryName = input() | |
| N = int(input()) | |
| files = [] | |
| for i in range(N): | |
| line = input().split() | |
| name = line[0] |
NewerOlder