Skip to content

Instantly share code, notes, and snippets.

@Siss3l
Siss3l / 0524.md
Created May 8, 2024 18:39
Intigriti's May 2024 Web Challenge thanks to @stealthcopter

Intigriti May Challenge

  • Category: Web
  • Impact: Medium
  • Solves: 20

Challenge

Description

@aamiaa
aamiaa / CompleteDiscordQuest.md
Last active May 21, 2024 17:43
Complete Recent Discord Quest

Complete Recent Discord Quest

Note

This no longer works in browser!

Note

This no longer works if you're alone in vc! Somebody else has to join you!

How to use this script:

  1. Accept the quest under User Settings -> Gift Inventory
@Siss3l
Siss3l / bb84.py
Created April 18, 2024 01:42
Weird Qtest
from qiskit import Aer, ClassicalRegister, QuantumCircuit, QuantumRegister, execute
from qiskit.tools.monitor import job_monitor
from random import choice, randint # from qiskit.circuit.library import U3Gate
chunk_size = 16
expected_key_length = 10
delta = 2 * chunk_size
roundtrips = (4 * expected_key_length + delta) // chunk_size
alice_qubits = QuantumRegister(chunk_size, name="q")
alice_bases = ClassicalRegister(chunk_size, name="b")
@Siss3l
Siss3l / 0424.md
Last active April 18, 2024 01:43
Intigriti's April 2024 Web Challenge thanks to @kiredevsandhacks

Intigriti April Challenge

  • Category: Web
  • Impact: Medium
  • Solves: 12

Challenge

Description

@VictorTaelin
VictorTaelin / a_b_challenge.md
Last active May 2, 2024 07:48
A::B Prompting Challenge: $10k to prove me wrong!

CHALLENGE

Develop an AI prompt that solves random 12-token instances of the A::B problem (defined here), with 90%+ success rate.

RULES

1. The AI will be given a <problem/> to solve.

We'll use your prompt as the SYSTEM PROMPT, and a specific instance of problem as the PROMPT, inside XML tags. Example:

@smx-smx
smx-smx / XZ Backdoor Analysis
Last active May 4, 2024 10:03
[WIP] XZ Backdoor Analysis and symbol mapping
XZ Backdoor symbol deobfuscation. Updated as i make progress
@thesamesam
thesamesam / xz-backdoor.md
Last active May 19, 2024 20:15
xz-utils backdoor situation (CVE-2024-3094)

FAQ on the xz-utils backdoor (CVE-2024-3094)

This is a living document. Everything in this document is made in good faith of being accurate, but like I just said; we don't yet know everything about what's going on.

Background

On March 29th, 2024, a backdoor was discovered in xz-utils, a suite of software that

@OrionReed
OrionReed / dom3d.js
Last active May 21, 2024 18:22
3D DOM viewer, copy-paste this into your console to visualise the DOM topographically.
// 3D Dom viewer, copy-paste this into your console to visualise the DOM as a stack of solid blocks.
// You can also minify and save it as a bookmarklet (https://www.freecodecamp.org/news/what-are-bookmarklets/)
(() => {
const SHOW_SIDES = false; // color sides of DOM nodes?
const COLOR_SURFACE = true; // color tops of DOM nodes?
const COLOR_RANDOM = false; // randomise color?
const COLOR_HUE = 190; // hue in HSL (https://hslpicker.com)
const MAX_ROTATION = 180; // set to 360 to rotate all the way round
const THICKNESS = 20; // thickness of layers
const DISTANCE = 10000; // ¯\\_(ツ)_/¯
@arkark
arkark / README.md
Last active March 4, 2024 15:50
osu!gaming CTF 2024 - web/profile-page-revenge
@aglab2
aglab2 / a.md
Last active May 17, 2024 19:44
Project 64 1.6 container escape vulnerability writeup

Vulnerable emulator is Project 64 1.6.x/1.7. 2 vulnerabilities can be used to gain arbitrary code execution from emulation container from N64 ROM.

  1. Container escape and arbitrary writes from N64 ROM outside of designated N64 RAM

Vulnerable function Compile_R4300i_SB and its friends Compile_R4300i_S* https://github.com/zeromus/pj64/blob/master/RecompilerOps.cpp#L1955C6-L2024

If non const Opcode.base is used to avoid condition at 1961-1971 which does checks properly, we can load from volatile address addr (compiled to MIPS asm inside ROM):