This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
HOST = args.HOST or 'localh1ost' | |
PORT = args.PORT or 123451 | |
conn = remote(HOST, PORT) | |
# Set receive buffer to 16 | |
conn.sendlineafter(b'> ', b'2') | |
conn.sendlineafter(b'Buffer size> ', b'16') |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
# This exploit template was generated via: | |
# $ pwn template ./scrambler --host 20.203.124.220 --port 1235 | |
from pwn import * | |
# Set up pwntools for the correct architecture | |
exe = context.binary = ELF('./scrambler_patched') | |
# Many built-in settings can be controlled on the command-line and show up |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
# This exploit template was generated via: | |
# $ pwn template ./secureHoroscope --host sechoroscope.sdc.tf --port 1337 | |
from pwn import * | |
# Set up pwntools for the correct architecture | |
#exe = context.binary = ELF('./secureHoroscope') | |
exe = context.binary = ELF('./secureHoroscope_patched') |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
# This exploit template was generated via: | |
# $ pwn template ./OilSpill_patched --host oil.sdc.tf --port 1337 | |
from pwn import * | |
# Set up pwntools for the correct architecture | |
#exe = context.binary = ELF('./OilSpill') | |
exe = context.binary = ELF('./OilSpill_patched') |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
# This exploit template was generated via: | |
# $ pwn template ./horoscope --host horoscope.sdc.tf --port 1337 | |
from pwn import * | |
# Set up pwntools for the correct architecture | |
exe = context.binary = ELF('./horoscope') | |
# Many built-in settings can be controlled on the command-line and show up |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
# This exploit template was generated via: | |
# $ pwn template ./BreakfastMenu_patched --host breakfast.sdc.tf --port 1337 | |
from pwn import * | |
# Set up pwntools for the correct architecture | |
exe = context.binary = ELF('./BreakfastMenu_patched') | |
# Many built-in settings can be controlled on the command-line and show up |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// only manual work was | |
// * renaming 'input_array' | |
// * making `input_array` int* | |
// * renaming 'input_as_ints' | |
long nwlrbbmqbh(void) | |
{ | |
undefined4 uVar1; | |
uint *input_array; | |
int iVar2; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
count 14 | |
local_38 3 | |
local_1c 10 | |
data b'cdarzowkky' | |
local_38 3 | |
local_1c 10 | |
data b'hiddqscdxr' | |
local_38 3 | |
local_1c 10 | |
data b'jmowfrxsjy' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
# This exploit template was generated via: | |
# $ pwn template --host localhost --port 17012 | |
from pwn import * | |
# Set up pwntools for the correct architecture | |
context.update(arch='i386') | |
exe = './path/to/binary' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
# This exploit template was generated via: | |
# $ pwn template vuln --host saturn.picoctf.net --port 58304 | |
from pwn import * | |
# Set up pwntools for the correct architecture | |
exe = context.binary = ELF('vuln') | |
# Many built-in settings can be controlled on the command-line and show up |
NewerOlder