I hereby claim:
- I am saelo on github.
- I am saelo (https://keybase.io/saelo) on keybase.
- I have a public key whose fingerprint is 2F05 A99F 01E0 E53D 5561 292F 8CB5 49AE F236 11B4
To claim this, I am signing this object:
| # | |
| # ~~~~~ Prefix ~~~~~ | |
| # | |
| # change prefix to ctrl-a | |
| set -g prefix C-a | |
| bind C-a send-prefix | |
| bind a send-prefix | |
| unbind C-b | |
| #Path to your oh-my-zsh configuration. | |
| ZSH=$HOME/.oh-my-zsh | |
| # Set name of the theme to load. | |
| # Look in ~/.oh-my-zsh/themes/ | |
| ZSH_THEME="agnoster" | |
| # Set to this to use case-sensitive completion | |
| # CASE_SENSITIVE="true" |
| " | |
| " Vundle | |
| " | |
| set nocompatible " be IMproved | |
| filetype off " required, reverted below | |
| " set the runtime path to include Vundle and initialize | |
| set rtp+=~/.vim/bundle/Vundle.vim | |
| call vundle#begin() |
I hereby claim:
To claim this, I am signing this object:
| package main | |
| import ( | |
| "fmt" | |
| "reflect" | |
| ) | |
| func Decorate(impl interface{}) interface{} { | |
| fn := reflect.ValueOf(impl) |
| #!/usr/bin/env python | |
| #coding: UTF-8 | |
| import struct | |
| import socket | |
| import telnetlib | |
| import time | |
| import sys | |
| import re |
| /* | |
| * Find php md5 collisions (var_dump(md5('240610708') == md5('QNKCDZO'));) | |
| * | |
| * gcc -Ofast -std=c99 -lcrypto -o phpcoll phpcoll.c | |
| * | |
| * Copyright (c) 2015 Samuel Groß | |
| */ | |
| #include <stdio.h> | |
| #include <unistd.h> |
| #include <stdio.h> | |
| #include <string.h> | |
| #include <unistd.h> | |
| #include <stdlib.h> | |
| #include <errno.h> | |
| #include <signal.h> | |
| #include <pty.h> | |
| #include <sys/types.h> | |
| #include <sys/stat.h> | |
| #include <fcntl.h> |
| # No comment... again... | |
| Playing around with gdb attached to the binary running under wine on Linux, we | |
| search for some of the strings that are printed when running the binary. Near | |
| those, we find a string that looks much like ascii art and ends with a '}', so | |
| this must be the flag. Unfortunately, the string only contains the last few | |
| characters, the start seems to have been overwritten. It appears like the | |
| string has been freed, and the front parts reclaimed by the heap allocator. | |
| Switching to Windows, we set a conditional breakpoint on msvcrt!free which |
| #!/usr/bin/env python3 | |
| # | |
| # Exploit for "assignment" of GoogleCTF 2017 | |
| # | |
| # CTF-quality exploit... | |
| # | |
| # Slightly simplified and shortened explanation: | |
| # | |
| # The bug is a UAF of one or both values during add_assign() if a GC is | |
| # triggered during allocate_value(). The exploit first abuses this to leak a |