I hereby claim:
- I am zznop on github.
- I am zznop (https://keybase.io/zznop) on keybase.
- I have a public key ASBbxPpeB6WStkXl4MEHA016MFr8cqqBJGpV6OxAhl53MAo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
uint32_t factorial(uint32_t number) | |
{ | |
if (number <= 1) | |
{ | |
return 1; | |
} | |
return number * factorial(number -1); | |
} |
int is_odd(int number) | |
{ | |
return number == 0 ? 0 : is_even(abs(number) - 1); | |
} | |
int is_even(int number) | |
{ | |
return number == 0 ? 1 : is_odd(abs(number) - 1); | |
} |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <stdint.h> | |
void take_int(int j) | |
{ | |
if (j == 1337) | |
printf("How could this be? j was never initialized!\n"); | |
} |
/* Plaid CTF 2018 v8 Exploit. Exploit begins around line 240 */ | |
/* ### Utils, thanks saelo ### */ | |
// | |
// Tiny module that provides big (64bit) integers. | |
// | |
// Copyright (c) 2016 Samuel Groß | |
// |
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; | |
;;; | |
;;; Copyright (C), zznop, [email protected] | |
;;; | |
;;; This software may be modified and distributed under the terms | |
;;; of the MIT license. See the LICENSE file for details. | |
;;; | |
;;; DESCRIPTION | |
;;; | |
;;; This PoC shellcode is meant to be compiled as a blob and prepended to a ELF |
# megadrive-loader.py | |
# zznop 2019 | |
# | |
# Load ROM as a flat binary, set processor to 68000, | |
# and run the script | |
import idc | |
import idautils | |
import ida_bytes | |
import ida_funcs |
import ida_segment | |
import ida_bytes | |
import idautils | |
import idaapi | |
import idc | |
import re | |
__author__ = 'zznop' | |
__copyright__ = 'Copyright 2019, zznop' | |
__email__ = '[email protected]' |
I hereby claim:
To claim this, I am signing this object:
package main; | |
import( | |
"github.com/labstack/echo" | |
"time" | |
"path/filepath" | |
"html/template" | |
"strings" | |
"os" | |
"net/http" |