Skip to content

Instantly share code, notes, and snippets.

@reductor
reductor / solve.py
Created January 15, 2023 22:20
idekctf 2022 - coroutine (author solution)
from pwn import *
HOST = args.HOST or 'localh1ost'
PORT = args.PORT or 123451
conn = remote(HOST, PORT)
# Set receive buffer to 16
conn.sendlineafter(b'> ', b'2')
conn.sendlineafter(b'Buffer size> ', b'16')
@reductor
reductor / solve.py
Created May 12, 2022 10:28
securinets final 2022 - scramble solve
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# This exploit template was generated via:
# $ pwn template ./scrambler --host 20.203.124.220 --port 1235
from pwn import *
# Set up pwntools for the correct architecture
exe = context.binary = ELF('./scrambler_patched')
# Many built-in settings can be controlled on the command-line and show up
@reductor
reductor / solve.py
Last active May 9, 2022 00:18
sdctf 2022 - secure horoscope
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# This exploit template was generated via:
# $ pwn template ./secureHoroscope --host sechoroscope.sdc.tf --port 1337
from pwn import *
# Set up pwntools for the correct architecture
#exe = context.binary = ELF('./secureHoroscope')
exe = context.binary = ELF('./secureHoroscope_patched')
@reductor
reductor / solve.py
Created May 9, 2022 00:15
sdctf 2022 - oilspill
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# This exploit template was generated via:
# $ pwn template ./OilSpill_patched --host oil.sdc.tf --port 1337
from pwn import *
# Set up pwntools for the correct architecture
#exe = context.binary = ELF('./OilSpill')
exe = context.binary = ELF('./OilSpill_patched')
@reductor
reductor / solve.py
Created May 9, 2022 00:14
sdctf 2022 - horoscope
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# This exploit template was generated via:
# $ pwn template ./horoscope --host horoscope.sdc.tf --port 1337
from pwn import *
# Set up pwntools for the correct architecture
exe = context.binary = ELF('./horoscope')
# Many built-in settings can be controlled on the command-line and show up
@reductor
reductor / solve.py
Created May 9, 2022 00:03
sdctf 2022 - breakfast solve script
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# This exploit template was generated via:
# $ pwn template ./BreakfastMenu_patched --host breakfast.sdc.tf --port 1337
from pwn import *
# Set up pwntools for the correct architecture
exe = context.binary = ELF('./BreakfastMenu_patched')
# Many built-in settings can be controlled on the command-line and show up
@reductor
reductor / bubblewrap.c
Created May 2, 2022 21:45
Ghidra decompile of bubblewrap b01lersCTF 2022
// only manual work was
// * renaming 'input_array'
// * making `input_array` int*
// * renaming 'input_as_ints'
long nwlrbbmqbh(void)
{
undefined4 uVar1;
uint *input_array;
int iVar2;
@reductor
reductor / bubblewrap.txt
Last active April 29, 2022 10:41
b01lersCTF 2022 : pactvm (will post proper write-up later)
count 14
local_38 3
local_1c 10
data b'cdarzowkky'
local_38 3
local_1c 10
data b'hiddqscdxr'
local_38 3
local_1c 10
data b'jmowfrxsjy'
@reductor
reductor / solve.py
Last active April 18, 2022 06:34
CrewCTF 2022 : Takumi
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# This exploit template was generated via:
# $ pwn template --host localhost --port 17012
from pwn import *
# Set up pwntools for the correct architecture
context.update(arch='i386')
exe = './path/to/binary'
@reductor
reductor / solve.py
Created April 7, 2022 23:06
picoCTF : stack cache
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# This exploit template was generated via:
# $ pwn template vuln --host saturn.picoctf.net --port 58304
from pwn import *
# Set up pwntools for the correct architecture
exe = context.binary = ELF('vuln')
# Many built-in settings can be controlled on the command-line and show up