SYMBOL INDEX (101 symbols across 36 files) FILE: Binary Exploitation/are you root?/files/auth.c type auth_level_t (line 6) | typedef enum auth_level { type user (line 14) | struct user { function give_flag (line 19) | void give_flag(){ function menu (line 36) | void menu(){ function main (line 46) | int main(int argc, char **argv){ FILE: Binary Exploitation/authenticate/files/auth.c function flag (line 9) | int flag() { function read_flag (line 23) | void read_flag() { function main (line 34) | int main(int argc, char **argv) { FILE: Binary Exploitation/buffer overflow 0/files/vuln.c function sigsegv_handler (line 10) | void sigsegv_handler(int sig) { function vuln (line 16) | void vuln(char *input){ function main (line 21) | int main(int argc, char **argv){ FILE: Binary Exploitation/buffer overflow 1/files/vuln.c function win (line 11) | void win() { function vuln (line 23) | void vuln(){ function main (line 30) | int main(int argc, char **argv){ FILE: Binary Exploitation/buffer overflow 2/files/vuln.c function win (line 10) | void win(unsigned int arg1, unsigned int arg2) { function vuln (line 26) | void vuln(){ function main (line 32) | int main(int argc, char **argv){ FILE: Binary Exploitation/buffer overflow 3/files/vuln.c function win (line 13) | void win() { function read_canary (line 27) | void read_canary() { function vuln (line 38) | void vuln(){ function main (line 64) | int main(int argc, char **argv){ FILE: Binary Exploitation/can-you-gets-me/files/gets.c function vuln (line 9) | void vuln() { function main (line 16) | int main(int argc, char **argv){ FILE: Binary Exploitation/echooo/files/echo.c function main (line 7) | int main(int argc, char **argv){ FILE: Binary Exploitation/got-2-learn-libc/files/vuln.c function vuln (line 13) | void vuln(){ function main (line 21) | int main(int argc, char **argv){ FILE: Binary Exploitation/got-shell?/files/auth.c function win (line 7) | void win() { function main (line 11) | int main(int argc, char **argv) { FILE: Binary Exploitation/gps/files/gps.c function initialize (line 10) | void initialize() { function acquire_satellites (line 19) | void acquire_satellites() { function main (line 46) | int main() { FILE: Binary Exploitation/leak-me/files/auth.c function flag (line 7) | int flag() { function main (line 22) | int main(int argc, char **argv){ FILE: Binary Exploitation/rop chain/files/rop.c function win_function1 (line 14) | void win_function1() { function win_function2 (line 18) | void win_function2(unsigned int arg_check1) { function flag (line 30) | void flag(unsigned int arg_check2) { function vuln (line 56) | void vuln() { function main (line 62) | int main(int argc, char **argv){ FILE: Binary Exploitation/shellcode/files/vuln.c function vuln (line 10) | void vuln(char *buf){ function main (line 15) | int main(int argc, char **argv){ FILE: Cryptography/James Brahm Returns/files/source.py function pad (line 12) | def pad(message): function encrypt (line 19) | def encrypt(key, plain, IV): function decrypt (line 23) | def decrypt(key, ciphertext, iv): function verify_mac (line 27) | def verify_mac(message): function check_padding (line 36) | def check_padding(message): FILE: Cryptography/Magic Padding Oracle/files/pkcs7.py function pad (line 16) | def pad(s): function isvalidpad (line 19) | def isvalidpad(s): function unpad (line 22) | def unpad(s): function encrypt (line 25) | def encrypt(m): function decrypt (line 30) | def decrypt(m): FILE: Cryptography/Magic Padding Oracle/solution/solution.py function add_zeros (line 10) | def add_zeros(string, desired_length): function decrypt_ciphertext (line 16) | def decrypt_ciphertext(cipherblock): function encrypt_plaintext (line 69) | def encrypt_plaintext(plaintext): FILE: Cryptography/SpyFi/files/spy_terminal_no_flag.py function pad (line 6) | def pad(message): function encrypt (line 11) | def encrypt(key, plain): FILE: Cryptography/Super Safe RSA 2/solution/wienerAttack/Arithmetic.py function egcd (line 7) | def egcd(a,b): function gcd (line 21) | def gcd(a,b): function modInverse (line 30) | def modInverse(e,n): function totient (line 38) | def totient(p,q): function bitlength (line 44) | def bitlength(x): function isqrt (line 56) | def isqrt(n): function is_perfect_square (line 75) | def is_perfect_square(n): function test_is_perfect_square (line 99) | def test_is_perfect_square(): FILE: Cryptography/Super Safe RSA 2/solution/wienerAttack/ContinuedFractions.py function rational_to_contfrac (line 8) | def rational_to_contfrac (x, y): function convergents_from_contfrac (line 22) | def convergents_from_contfrac(frac): function contfrac_to_rational (line 32) | def contfrac_to_rational (frac): function test1 (line 47) | def test1(): FILE: Cryptography/Super Safe RSA 2/solution/wienerAttack/RSAwienerHacker.py function hack_RSA (line 9) | def hack_RSA(e,n): function test_hack_RSA (line 34) | def test_hack_RSA(): FILE: Cryptography/Super Safe RSA/solution/solve.py function eea (line 11) | def eea(a,b): function find_inverse (line 17) | def find_inverse(x,y): FILE: General Skills/absolutely relative/files/absolutely-relative.c function main (line 7) | int main() FILE: General Skills/roulette/files/roulette.c function is_digit (line 21) | int is_digit(char c) { function get_long (line 25) | long get_long() { function get_rand (line 45) | long get_rand() { function get_bet (line 56) | long get_bet() { function get_choice (line 69) | long get_choice() { function print_flag (line 81) | int print_flag() { function spin_roulette (line 123) | void spin_roulette(long spin) { function play_roulette (line 163) | void play_roulette(long choice, long bet) { function main (line 182) | int main(int argc, char *argv[]) { FILE: General Skills/roulette/solution/generate.c function main (line 5) | int main(int argc, char *argv[]) { FILE: General Skills/script me/solution/solve.py function solve (line 9) | def solve(problem): function main (line 42) | def main(): FILE: General Skills/store/files/source.c function main (line 3) | int main() FILE: Reversing/assembly-2/solution/solve.c function main (line 3) | int main() { FILE: Reversing/assembly-3/solution/solve.c function main (line 3) | int main() { FILE: Reversing/be-quick-or-be-dead-2/solution/calculate.py function fib (line 3) | def fib(n): FILE: Reversing/be-quick-or-be-dead-3/solution/solve.py function calc (line 1) | def calc(n): FILE: Reversing/keygen-me-1/solution/test.c function validate_key (line 18) | int validate_key(int keyArgs) { FILE: Web Exploitation/A Simple Question/solution/solve.py function brute (line 5) | def brute(): FILE: Web Exploitation/Inspect Me/solution/source/myjs.js function openTab (line 1) | function openTab(tabName,elmnt,color) { FILE: Web Exploitation/Secure Logon/files/server_noflag.py function main (line 20) | def main(): function login (line 24) | def login(): function logout (line 44) | def logout(): function flag (line 50) | def flag(): class AESCipher (line 68) | class AESCipher: method __init__ (line 76) | def __init__(self, key): method encrypt (line 79) | def encrypt(self, raw): method decrypt (line 85) | def decrypt(self, enc): FILE: Web Exploitation/fancy-alive-monitoring/solution/solve.py function exploit (line 10) | def exploit(whut, exploit):