I hereby claim:
- I am saelo on github.
- I am saelo (https://keybase.io/saelo) on keybase.
- I have a public key whose fingerprint is 2F05 A99F 01E0 E53D 5561 292F 8CB5 49AE F236 11B4
To claim this, I am signing this object:
# | |
# ~~~~~ Prefix ~~~~~ | |
# | |
# change prefix to ctrl-a | |
set -g prefix C-a | |
bind C-a send-prefix | |
bind a send-prefix | |
unbind C-b | |
#Path to your oh-my-zsh configuration. | |
ZSH=$HOME/.oh-my-zsh | |
# Set name of the theme to load. | |
# Look in ~/.oh-my-zsh/themes/ | |
ZSH_THEME="agnoster" | |
# Set to this to use case-sensitive completion | |
# CASE_SENSITIVE="true" |
" | |
" Vundle | |
" | |
set nocompatible " be IMproved | |
filetype off " required, reverted below | |
" set the runtime path to include Vundle and initialize | |
set rtp+=~/.vim/bundle/Vundle.vim | |
call vundle#begin() |
I hereby claim:
To claim this, I am signing this object:
package main | |
import ( | |
"fmt" | |
"reflect" | |
) | |
func Decorate(impl interface{}) interface{} { | |
fn := reflect.ValueOf(impl) |
#!/usr/bin/env python | |
#coding: UTF-8 | |
import struct | |
import socket | |
import telnetlib | |
import time | |
import sys | |
import re |
/* | |
* Find php md5 collisions (var_dump(md5('240610708') == md5('QNKCDZO'));) | |
* | |
* gcc -Ofast -std=c99 -lcrypto -o phpcoll phpcoll.c | |
* | |
* Copyright (c) 2015 Samuel Groß | |
*/ | |
#include <stdio.h> | |
#include <unistd.h> |
#include <stdio.h> | |
#include <string.h> | |
#include <unistd.h> | |
#include <stdlib.h> | |
#include <errno.h> | |
#include <signal.h> | |
#include <pty.h> | |
#include <sys/types.h> | |
#include <sys/stat.h> | |
#include <fcntl.h> |
# No comment... again... | |
Playing around with gdb attached to the binary running under wine on Linux, we | |
search for some of the strings that are printed when running the binary. Near | |
those, we find a string that looks much like ascii art and ends with a '}', so | |
this must be the flag. Unfortunately, the string only contains the last few | |
characters, the start seems to have been overwritten. It appears like the | |
string has been freed, and the front parts reclaimed by the heap allocator. | |
Switching to Windows, we set a conditional breakpoint on msvcrt!free which |
#!/usr/bin/env python3 | |
# | |
# Exploit for "assignment" of GoogleCTF 2017 | |
# | |
# CTF-quality exploit... | |
# | |
# Slightly simplified and shortened explanation: | |
# | |
# The bug is a UAF of one or both values during add_assign() if a GC is | |
# triggered during allocate_value(). The exploit first abuses this to leak a |