Skip to content

Instantly share code, notes, and snippets.

@spnow
spnow / Entrop3r.py
Created April 14, 2017 23:50 — forked from the-st0rm/Entrop3r.py
Nuit du hack 2017 Quals - Entrop3r (pwn 300)
#!/usr/bin/python
# -*- coding: utf-8 -*-
import socket
import sys
import string
import time
def recv_until(s, data):
res = ""

Awesome Pwnable

Meta

  • awesome-ctf - A curated list of CTF frameworks, libraries, resources and softwares

Heap Exploitation

  • malloc.c - malloc() implementation in glib-2.23 (as found in Ubuntu 16.04.1 LTS)
  • how2heap - Awesome collection of various heap exploitation techniques
@spnow
spnow / reclaimWindows10.ps1
Created April 11, 2017 23:37 — forked from alirobe/reclaimWindows10.ps1
"Reclaim Windows 10" turns off a bunch of unnecessary Windows 10 telemetery, removes bloatware, and privacy invasions. Review and tweak before running. Scripts for reversing are included and commented. Fork via https://github.com/Disassembler0 (different defaults)
##########
# Win10 Initial Setup Script
# Author: Disassembler <[email protected]>
# Version: 1.7, 2016-08-15
# dasm's script: https://github.com/Disassembler0/Win10-Initial-Setup-Script/
# THIS IS A PERSONALIZED VERSION
# This script leaves more MS defaults on, including MS security features.
# Tweaked based on personal preferences for @alirobe 2016-11-16 - v1.7.1
def decrypt(func):
"""
Decryption of zeus strings
"""
ZBOT_INDEX_MIN = 0x0
ZBOT_INDEX_MAX = 0xe7
data = {}
for i in range(ZBOT_INDEX_MIN, ZBOT_INDEX_MAX):
@spnow
spnow / windows_privesc
Created April 11, 2017 23:30 — forked from sckalath/windows_privesc
Windows Privilege Escalation
// What system are we connected to?
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
// Get the hostname and username (if available)
hostname
echo %username%
// Get users
net users
net user [username]
@spnow
spnow / OmniCode
Created April 11, 2017 22:26 — forked from sahwar/OmniCode
OmniCode! version 0.1.7
Description for the New Net
All codes are built in the following way:
[code symbol][attribute].[modifier].[modifier].[modifier]...
or for multiple codes:
[code symbol][attribute].[modifier]&[attribute].[modifier]...
@spnow
spnow / col_solve.py
Created March 16, 2017 21:06 — forked from wumb0/col_solve.py
angr solver for the collision challenge of pwnable.kr
from angr import Project, surveyors
from sys import exit
import claripy
'''vars
pstr: where the dynamic input will be stored in the state
phcode: the address of hash to collide with (the program loads the correct hash from this address)
find: the address we want the path explorer to find (the "you win" address)
retn: the simulation starts in a function called from main (check_password) but the 'find' address is in main so I need a place to return
@spnow
spnow / sqlpwn.php
Created March 16, 2017 21:05 — forked from RickGray/sqlpwn.php
AIS3 Final CTF Web
<?php
/*
sqlpwn by orange
Don't brute force or you will be banned !
*/
session_start();
error_reporting(0);
include "template.html";
@spnow
spnow / stdio_ctf_trick.md
Created March 16, 2017 21:03
ctf trick for persist stdio in pwn
(python -c 'print "payload"'; cat -) | nc pwnable.url
(echo payload; cat) | ./pwnable

cat payload - | ./pwnable

@spnow
spnow / README.MD
Created March 16, 2017 21:02 — forked from mjb940806/README.MD
Pwnable.kr [Toddler's Bottle] Writeup

1. fd

ssh [email protected] -p2222 (pw:guest)

๐Ÿ‘ SSH

์ถœ์ฒ˜

์‹œํ์–ด ์…ธ(Secure Shell, SSH)๋Š” ๋„คํŠธ์›Œํฌ ์ƒ์˜ ๋‹ค๋ฅธ ์ปดํ“จํ„ฐ์— ๋กœ๊ทธ์ธํ•˜๊ฑฐ๋‚˜ ์›๊ฒฉ ์‹œ์Šคํ…œ์—์„œ ๋ช…๋ น์„ ์‹คํ–‰ํ•˜๊ณ  ๋‹ค๋ฅธ ์‹œ์Šคํ…œ์œผ๋กœ ํŒŒ์ผ์„ ๋ณต์‚ฌํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•ด ์ฃผ๋Š” ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ ๋˜๋Š” ๊ทธ ํ”„๋กœํ† ์ฝœ์„ ๊ฐ€๋ฆฌํ‚จ๋‹ค. ๊ธฐ์กด์˜ rsh, rlogin, ํ…”๋„ท ๋“ฑ์„ ๋Œ€์ฒดํ•˜๊ธฐ ์œ„ํ•ด ์„ค๊ณ„๋˜์—ˆ์œผ๋ฉฐ, ๊ฐ•๋ ฅํ•œ ์ธ์ฆ ๋ฐฉ๋ฒ• ๋ฐ ์•ˆ์ „ํ•˜์ง€ ๋ชปํ•œ ๋„คํŠธ์›Œํฌ์—์„œ ์•ˆ์ „ํ•˜๊ฒŒ ํ†ต์‹ ์„ ํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•œ๋‹ค.