summaryrefslogtreecommitdiffstats
AgeCommit message (Collapse)AuthorFilesLines
2021-08-31Add Interactive Mode to Commsdusoleil1-1/+49
comm.interact() will drop the user into an "interactive" mode where they can directly control what is sent. A SIGINT (Ctrl+C) will drop the script out of interactive mode and continue executing the rest of the script. If the output of the program (input into our script) goes into a broken state (such as when the target program exits), interactive mode will automatically exit. Signed-off-by: dusoleil <howcansocksbereal@gmail.com>
2021-08-31Add readuntil() and readlineuntil() to Commsdusoleil1-0/+14
Both new functions check the input for a predicate and keep reading until the predicate is true. readuntil() will consume input byte by byte and use the entire string read to check the predicate. It will then return that entire string. readlineuntil() consumes input line by line and only uses the last line to check the predicate. The line that satisfies the predicate is all that is returned. Signed-off-by: dusoleil <howcansocksbereal@gmail.com>
2021-08-31Use With Statement for Temporary Directorydusoleil1-4/+4
Signed-off-by: dusoleil <howcansocksbereal@gmail.com>
2021-08-30Sploit Rework MVP Structure, Packaging, and Commsdusoleil15-329/+133
First part of the MVP for the larger Sploit rework effort. Add project structure, python packaging, basic comms, and "log" hook. From in or out of the sploit directory, you can run the "sploit.py" script, run python -m sploit, or import the sploit modules from the python3 shell. You can also pip install Sploit and from anywhere you can run the sploit command, run python -m sploit, or import the sploit modules from the python3 shell. Running as a standalone application, Sploit can run in a "target" mode, a "pipe" mode, and a "pipe daemon" mode. In "target" mode, Sploit will launch a target program as a subprocess and run an exploit script against its I/O. In "pipe" mode, Sploit will create named fifos and wait for a program to connect to them to run an exploit script against them. In "pipe daemon" mode, Sploit will run similar to the "pipe" mode, but automatically recreate the fifos with the same name after each execution. Basic comm operations of read, readline, write, and writeline are available to the exploit script. A "log" hook is executed whenever data is read in from the target program. This will just print the data out, but it can be configured to decode it with a specific encoding or you could replace the function for different behavior. Signed-off-by: dusoleil <howcansocksbereal@gmail.com>
2021-08-22Merge branch 'shellcode-templates'Malfurious9-34/+100
This is content from an old repo of mine. I think it makes much more sense to merge it into lib-des-gnux. templates/shellcode/ will track any useful shellcode recipes and contains utilities for building them into ready-to-use payloads. * shellcode-templates: Globally ignore all build artifacts Add Makefile for shellcode templates Refactor genhex into shelltool Add sys_exit shellcode templates Add generic /bin/sh shellcode templates
2021-08-22Globally ignore all build artifactsMalfurious2-1/+8
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-22Add Makefile for shellcode templatesMalfurious1-0/+17
The shell*.asm files are considered the default programs and the expected use-case for utilizing the templates is to edit these files to implement the desired shellcode. I figure that literal shellcode makes the most sense of what to expect by default. 'make all' will assemble and link the shellcode (so it can actually be directly executed via the output elf files), and feed the disassembly into shelltool for use elsewhere. Signed-off-by: Malfurious <m@lfurio.us>
2021-08-22Refactor genhex into shelltoolMalfurious2-33/+30
For convenience, I've rewritten my old shellcode parser program in Python. It is moved to the shellcode templates dir and renamed to shelltool. As a new feature, shelltool will now check the result for NULL bytes and newline bytes that may cause problems in an exploit. Signed-off-by: Malfurious <m@lfurio.us>
2021-08-22Add sys_exit shellcode templatesMalfurious2-0/+16
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-22Add generic /bin/sh shellcode templatesMalfurious2-0/+29
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-21Add writeup for RaRCTF 2021 / Boring Flag CheckerMalfurious1-0/+236
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-16Add writeup for RaRCTF 2021 / Not That SimpleMalfurious1-0/+214
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-15Commit notes from RaRCTF 2021Malfurious3-0/+17
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-15Update documentation on x86 architectureMalfurious3-19/+107
Some new links are added from the latest CTF. Signed-off-by: Malfurious <m@lfurio.us>
2021-08-11Merge tag 'pull-duso-metasploit-writeups' of ↵Malfurious9-0/+379
https://github.com/Dusoleil/lib-des-gnux Dusoleil's Writeups for the Metasploit Community CTF 2020 * tag 'pull-duso-metasploit-writeups' of https://github.com/Dusoleil/lib-des-gnux: Dusoleil's Writeups from Metasploit Community CTF 2020
2021-08-11Add notes on Python requests libraryMalfurious1-0/+26
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-11Commit PHP request logging scriptMalfurious1-0/+49
Taken from github, see comment in file. Signed-off-by: Malfurious <m@lfurio.us>
2021-08-10Commit brainfuck toolsMalfurious4-0/+435
The foremost tool in this collection is the brainfuck debugger. It was written to assist with the 'boring flag checker' problem from RaRCTF 2021, but has good potential for general-purpose use. The compiler and decompiler are much more niche, given brainfuck is not typically a compiled language. They are from the same CTF and, although highly problem-specific, are kept around for posterity. A hello world program is saved under templates as a quick sanity check for the tools as well as for reference purposes, should it become useful. Signed-off-by: Malfurious <m@lfurio.us>
2021-08-10RaRCTF 2021 resultsMalfurious1-0/+1
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-07Dusoleil's Writeups from Metasploit Community CTF 2020dusoleil9-0/+379
Signed-off-by: dusoleil <howcansocksbereal@gmail.com>
2021-08-05Commit some forensics linksMalfurious2-0/+4
AperiSolve is a tool I stumbled upon a while back and have been meaning to bookmark here. CyberChef reported by dusoleil. Signed-off-by: Malfurious <m@lfurio.us>
2021-08-05Add writeup for ImaginaryCTF 2021 / RoolangMalfurious2-0/+584
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-03Merge tag 'pull-duso-imaginary-writeups' of ↵Malfurious34-0/+1822
https://github.com/Dusoleil/lib-des-gnux Writeups and other tools/docs from ImaginaryCTF from Dusoleil. * tag 'pull-duso-imaginary-writeups' of https://github.com/Dusoleil/lib-des-gnux: Adding Initial Commit of the Sploit Tool Adding Various Docs Adding Various Small Tools Git Ignore __pycache__ for All Tools Writeups from Imaginary CTF 2021
2021-08-03Adding Initial Commit of the Sploit Tooldusoleil8-0/+330
Signed-off-by: dusoleil <howcansocksbereal@gmail.com>
2021-08-03Adding Various Docsdusoleil3-0/+183
Adding a short list of pwn links, a note about python support for complex numbers, and a short SSTI guide. Signed-off-by: dusoleil <howcansocksbereal@gmail.com>
2021-08-01Adding Various Small Toolsdusoleil3-0/+87
Signed-off-by: dusoleil <howcansocksbereal@gmail.com>
2021-08-01Git Ignore __pycache__ for All Toolsdusoleil1-0/+1
Signed-off-by: dusoleil <howcansocksbereal@gmail.com>
2021-08-01Writeups from Imaginary CTF 2021dusoleil19-0/+1221
Adding Dusoleil's writeups from Imaginary CTF 2021 Signed-off-by: dusoleil <howcansocksbereal@gmail.com>
2021-08-01Rename automation directory to templatesMalfurious1-0/+0
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-01Add gdb cheat sheetMalfurious1-0/+101
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-01Document various low-level C IO characteristicsMalfurious1-0/+29
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-01Elaborate on test v cmpMalfurious1-4/+7
cmp instruction did not have an example. Signed-off-by: Malfurious <m@lfurio.us>
2021-08-01Fix typosMalfurious1-2/+2
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-01Add writeup for ImaginaryCTF 2021 / SpeedrunMalfurious1-0/+380
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-01ImaginaryCTF 2021 resultsMalfurious1-0/+2
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-01Add PHP memesMalfurious1-0/+0
Signed-off-by: Malfurious <m@lfurio.us>
2021-08-01Add sections to the README fileMalfurious1-0/+19
The wishlist is a collection of things I want to add to the repository (either can't find them easily, or tools that need to be written). The quick reference is for random one-liner things that don't easily fit anywhere else in the folder structure. Signed-off-by: Malfurious <m@lfurio.us>
2021-08-01Add a collection of common wordlistsMalfurious7-0/+1615490
Signed-off-by: Malfurious <m@lfurio.us>
2021-07-23Change README to plaintext only fileMalfurious1-1/+2
The intened way to view this file is directly via plaintext, so remove the intent of having any specific markdown within the document. Signed-off-by: Malfurious <m@lfurio.us>
2020-12-21Add libpng skeleton fileMalfurious1-0/+176
Signed-off-by: Malfurious <m@lfurio.us>
2020-12-21Add Java serialization documentationMalfurious1-0/+41
Signed-off-by: Malfurious <m@lfurio.us>
2020-12-21Add netcat-based port scannerMalfurious1-0/+2
Signed-off-by: Malfurious <m@lfurio.us>
2020-12-21Create tools directoryMalfurious3-0/+0
Signed-off-by: Malfurious <m@lfurio.us>
2020-12-20Create RE documentation directoryMalfurious3-0/+33
Signed-off-by: Malfurious <m@lfurio.us>
2020-12-20Add Metasploit 2020 CTF resultsMalfurious1-0/+2
Signed-off-by: Malfurious <m@lfurio.us>
2020-12-04Commit genhex programMalfurious1-0/+33
This is a utility program from my shellcoding repository. It uses the dissassembly output from objdump to auto-format a payload from an assembled object file. Signed-off-by: Malfurious <m@lfurio.us>
2020-12-04Finish filling out USB scancodes tableMalfurious1-2/+110
Signed-off-by: Malfurious <m@lfurio.us>
2020-12-03Add WIP USB PCAP documentationMalfurious1-0/+27
This was leftover in my working directory from the last ctf.... Signed-off-by: Malfurious <m@lfurio.us>
2019-05-05Import CTF scores historyMalf Furious1-0/+10
This data is imported from the wiki and includes the results from CSA CTF 2019, which, at the time of this writing, has just concluded. Signed-off-by: Malf Furious <m@lfurio.us>
2019-05-05Import IceCTF 2018/Hot or Not writeup from the wikiMalf Furious6-0/+617
Signed-off-by: Malf Furious <m@lfurio.us>