Skip to content

Instantly share code, notes, and snippets.

View syndrill's full-sized avatar
🎯
Focusing

Syndril Cullwyn syndrill

🎯
Focusing
View GitHub Profile
@syndrill
syndrill / README.md
Created July 31, 2020 20:29
HacktivityCon CTF 2020 - What's In The Jar? Writeup

What's in The Jar?

Challenge your friends to a classic game of "What's in the jar"!

Connect with:
nc jh2i.com 50030

The challenge itself doesn't have any source attached, but when you solve the challenge you'll notice there's src/ folder which I have included for simplicity.

//
// Utility functions.
//
// Copyright (c) 2016 Samuel Groß
//
// Return the hexadecimal representation of the given byte.
function hex(b) {
return ('0' + b.toString(16)).substr(-2);
}
@syndrill
syndrill / pwn.js
Created May 13, 2019 02:01
JS pwnage
// Copyright (c) 2018 Samuel Groß
// Return the hexadecimal representation of the given byte.
function hex(b) {
return ('0' + b.toString(16)).substr(-2);
}
// Return the hexadecimal representation of the given byte array.
function hexlify(bytes) {
var res = [];
@syndrill
syndrill / solve.py
Created October 13, 2018 16:25
p11-zeus
#!/usr/bin/env python
from pwn import *
import sys
gdbcmd = 'b *0x004011ca'
# context.terminal = 'kitty @ new-window --new-tab --tab-title pwn --keep-focus sh -c'.split()
if sys.argv.__len__() == 3:
r = remote(sys.argv[1], int(sys.argv[2]))
@syndrill
syndrill / Dockerfile
Created September 17, 2018 11:52
HackToday 2018 - faile
FROM phusion/baseimage
EXPOSE 5000
ARG binary
ENV binary=${binary}
# update
RUN apt update && apt upgrade -y && apt update --fix-missing
RUN apt install curl python netcat-openbsd vim nano socat lib32ncurses5 -y
@syndrill
syndrill / pomfload
Last active February 25, 2020 20:39 — forked from shizmob/pomfload
simple pomf (lolisafe) uploader
#!/bin/sh
downpomf="https://a.safe.moe/"
uppomf="https://safe.moe/api/upload"
token="CHANGE_TOKEN"
if test $# -lt 1 ; then
echo "Usage: `basename $0` FILE [FILE...]"
exit 1
fi
#!/bin/bash
# bash-hexdump
# by Dennis Williamson - 2010-01-04
# in response to http://stackoverflow.com/questions/2003803/show-hexadecimal-numbers-of-a-file
# usage: bash-hexdump file
if [[ -z "$1" ]]
then
exec 3<&0 # read stdin
[[ -p /dev/stdin ]] || tty="yes" # no pipe

Keybase proof

I hereby claim:

  • I am zeroload on github.
  • I am zeroload (https://keybase.io/zeroload) on keybase.
  • I have a public key whose fingerprint is AF3F 8F2E 472B 1394 D7E0 5E21 E34B AEEA 43D2 C747

To claim this, I am signing this object:

@syndrill
syndrill / xxtea.py
Last active December 8, 2019 21:55 — forked from shuax/xxtea.py
cocos2d-x implementation of XXTEA
#!/usr/bin/env python
# -*- coding: UTF-8 -*-
import struct
_DELTA = 0x9E3779B9
def _long2str(v, w):
n = (len(v) - 1) << 2
if w: