new_lines_list = [] for line in lines_list: new_line = line[:-8] new_line = remove_between_pipes(new_line) new_lines_list.append(' '.join(new_line.split('\n')))
# 将结果写入新的文本文件 withopen('114.txt', 'w') as new_file: for new_line in new_lines_list: new_file.write(new_line.replace(" ", ""))
withopen('114.txt', 'r') as file: lines = file.read() new_lines_list = lines[::-1] withopen('114.txt', 'w') as new_file: for new_line in new_lines_list: new_file.write(new_line.replace(" ", ""))
010导入16进制文件即可,保存成RAR
最后用ARCHPR通过提示爆破密码
ez_model
网上搜索脚本,直接查看模型数据
1 2 3 4 5 6 7 8 9 10 11 12 13 14
import torch
pthfile = r'./easy.pth'# .pth文件的路径 model = torch.load(pthfile, torch.device('cpu')) # 设置在cpu环境下查询 print('type:') print(type(model)) # 查看模型字典长度 print('length:') print(len(model)) print('key:') for k in model.keys(): # 查看模型字典里面的key print(k) print('value:') for k in model: # 查看模型字典里面的value print(k, model[k])
from Crypto.Util.number import * import sympy import binascii
m = 3 c = 2755382540415579102071064701464875587397358450731640269892589311709262533380944401636001606033435395119029405853044523473152024882723244640973125106544997919867124733729051371170794687714291 n = 3006156660704242356836102321001016782090189571028526298055526061772989406357037170723984497344618257575827271367883545096587962708266010793826346841303043716776726799898939374985320242033037
flag = sympy.discrete_log(n, c, m) print(long_to_bytes(flag))