Note
This no longer works in browser!
Note
This no longer works if you're alone in vc! Somebody else has to join you!
How to use this script:
- Accept the quest under User Settings -> Gift Inventory
name: PyQt5 | |
cleanup: | |
- "/include" | |
- "/lib/python3.8/site-packages/*.pyi" | |
- "/lib/python3.8/site-packages/PyQt5/uic" | |
config-opts: | |
- "--disable-static" | |
- "--enable-x11" | |
buildsystem: simple | |
build-commands: |
Liber Primus Files: https://www.dropbox.com/sh/lkta4q921vliyuw/AADmZ1YUHXWSjSizlMGZHXVMa?dl=0
More Original files: github: https://github.com/rtkd/iddqd
IGGG Advent Calender 2015のために書いた記事です。
常設CTFで遊んでたらPwnable系の問題を解いてるうちにいろいろと勉強になったのでまとめます。
PwnableとはCTFのジャンルの1つで、プログラムの脆弱性をつき、本来アクセスできないメモリ領域にアクセスして操作し、フラグを取得する感じの問題です。
別名としてExploit
があります。
<?php | |
namespace App\Http\Controllers\API; | |
class ResponseFormatter | |
{ | |
protected static $response = [ | |
'meta' => [ | |
'code' => 200, | |
'status' => 'success', |
// | |
// SignatureAnimation.swift | |
// OpenSwiftUIAnimations | |
// | |
// Created by Amos Gyamfi on 11.5.2024. | |
// | |
import SwiftUI | |
struct SignatureAnimation: View { |
# This is a super **SIMPLE** example of how to create a very basic powershell webserver | |
# 2019-05-18 UPDATE — Created by me and and evalued by @jakobii and the comunity. | |
# Http Server | |
$http = [System.Net.HttpListener]::new() | |
# Hostname and port to listen on | |
$http.Prefixes.Add("http://localhost:8080/") | |
# Start the Http Server |
library(dplyr) | |
library(shiny) | |
library(DT) | |
library(purrr) | |
shinyServer(function(input, output, session) { | |
tab_list <- NULL | |
# Groupped mtcars |