Skip to content
Permalink
Browse files

initial commit

  • Loading branch information
akiym committed Feb 23, 2015
0 parents commit efe53241480c3ec4539526021de1517e4918daa8
Showing with 34,500 additions and 0 deletions.
  1. +1 −0 .gitignore
  2. +31 −0 02/alert_man.html
  3. BIN 03/listen.wav
  4. BIN 04/easyone
  5. +60 −0 04/easyone.c
  6. BIN 05/apad.png
  7. +7,064 −0 05/enchant.js
  8. BIN 05/end.png
  9. BIN 05/font0.png
  10. BIN 05/graphic.png
  11. BIN 05/icon0.png
  12. +180 −0 05/nineleap.enchant.js
  13. BIN 05/pad.png
  14. +22 −0 05/shooting.html
  15. +3 −0 05/shooting.min.js
  16. BIN 05/start.png
  17. +919 −0 05/ui.enchant.js
  18. +21 −0 06/paths.py
  19. +273 −0 07/barcode.pl
  20. BIN 08/flag.jpg
  21. BIN 08/flag.jpg.enc
  22. +23 −0 08/rotate-dec.py
  23. +19 −0 08/rotate.py
  24. +71 −0 09/gen.pl
  25. BIN 09/qrgarden.png
  26. +54 −0 10/decrypt.c
  27. +19 −0 10/problem.txt
  28. +16 −0 10/xor.c
  29. +117 −0 11/blacklist.pl
  30. +14 −0 11/blacklist.sql
  31. BIN 12/bruteforce
  32. +81 −0 12/bruteforce.c
  33. +153 −0 13/loginpage.pl
  34. +1 −0 13/user.txt
  35. +46 −0 14/secret_table.pl
  36. +3 −0 14/sqlite.sql
  37. BIN 15/password-checker
  38. +24,593 −0 15/password-checker.c
  39. +13 −0 15/password-checker.pl
  40. BIN 16/blind_shell
  41. +66 −0 16/blind_shell.c
  42. +1 −0 16/flag_is_in_dir/this_is_flag
  43. +1 −0 17/flag
  44. BIN 17/oh_my_scanf
  45. +13 −0 17/oh_my_scanf.c
  46. +1 −0 18/flag.enc
  47. +14 −0 18/key.pub
  48. +93 −0 19/guess.c
  49. BIN 19/guesskey
  50. BIN 20/easypwn
  51. +65 −0 20/easypwn.c
  52. +1 −0 20/flag
  53. +112 −0 21/otp.pl
  54. +110 −0 21/otp__censored__.pl
  55. +5 −0 21/sqlite.sql
  56. +2 −0 22/wtfregexp.pl
  57. +1 −0 23/flag
  58. BIN 23/shellcodeme
  59. +14 −0 23/shellcodeme.c
  60. BIN 23/shellcodeme2
  61. +1 −0 24/flag
  62. BIN 24/getflag
  63. +1 −0 24/hint
  64. +44 −0 24/stage1.php
  65. +51 −0 24/stage2_30c401d6f53803c3e3dfe2beaf94c620.php
  66. +44 −0 24/stage3_9eaeec9bd606f259e92546a7fff593d6.php
  67. +29 −0 24/sudoers
  68. +34 −0 README.md
@@ -0,0 +1 @@
.DS_Store
@@ -0,0 +1,31 @@
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8" />
<title>alert man</title>
</head>
<body>
<h1>alert man</h1>
<form id="form">
<input type="text" id="text" />
<input type="submit" value="tweet" />
</form>
<p>Your tweet:</p>
<ul id="tweets"></ul>
<script>
function appendTweet(tweet) {
t = tweet.replace(/['"]/g, '');
li = document.createElement('li');
li.innerHTML = t;
document.getElementById('tweets').appendChild(li);
};
appendTweet('here is your tweet!');
_='var :=[" HVHD>B>D91LI 01ZDS 7$LVDB0* 89V0D&6Z4I4*H3#NDB31&49&15&2&W9&3&9492832W5??5613W780D$S5HC7*4 B B3 3*674DE7 98SCY 3 BSC FYD#DBOPQ@X969963O6667@4A782/0C@/85QOM71Q%X53@TE14 1375H0833O4@DA5/39E%G84GDGC2N83%@7C78XA%X%TDG381%G3T4081PP447/6M0!9!70!29!1!4C27%PQ13"];eval(function (UJ2J3J4J5J6){while(3--){if(<{U=U[ 6]]( new RegExp( 4]+3+ 4], 5]),<KK;return UK( 0],10,49, 3][ 2]]( 1])));\\x500N53_0x3268x C76 :[ 2 2B435C5I 56NM9D 84","E1 !9#D6V0$ 7%2& * E.6/2:_0x2915<4[3])>0 EM?7W8@9TFG4H0I 9J,K;} L. 2M8N7O3P0QCS$TAU1V W5X6Y E$ZI.';for(Y in $='ZYXWVUTSQPONMLKJIHGA@?><:/.*&%$#! ')with(_.split($[Y]))_=join(pop());eval(_);
document.getElementById('form').onsubmit = function() {
tweet = document.getElementById('text').value;
appendTweet(tweet);
return false;
};
</script>
</body>
</html>
BIN +321 KB 03/listen.wav
Binary file not shown.
BIN +8.42 KB 04/easyone
Binary file not shown.
@@ -0,0 +1,60 @@
#include <stdio.h>

// ADCTF_7H15_15_7oO_345y_FOR_M3

int main (void) {
char password[30], input[30];
char *p1, *p2;
p1 = password;
p2 = input;

printf("password: ");
scanf("%29s", input);

password[6] = '7';
password[18] = '3';
password[11] = '1';
password[7] = 'H';
password[14] = '7';
password[24] = 'O';
password[20] = '5';
password[9] = '5';
password[16] = 'O';
password[22] = '_';
password[21] = 'y';
password[28] = '3';
password[2] = 'C';
password[25] = 'R';
password[8] = '1';
password[3] = 'T';
password[12] = '5';
password[23] = 'F';
password[0] = 'A';
password[26] = '_';
password[27] = 'M';
password[13] = '_';
password[10] = '_';
password[15] = 'o';
password[5] = '_';
password[19] = '4';
password[4] = 'F';
password[17] = '_';
password[1] = 'D';
password[29] = '\0';

while (1) {
if (*p1 != *p2) {
printf("wrong\n");
return 1;
}
if (*p1 == '\0' && *p2 == '\0') {
break;
}
p1++;
p2++;
}

printf("correct. the flag is: %s\n", input);

return 0;
}
BIN +5.45 KB 05/apad.png
Binary file not shown.

0 comments on commit efe5324

Please sign in to comment.
You can’t perform that action at this time.