diff options
| author | Louis Burda <quent.burda@gmail.com> | 2024-03-30 15:37:05 +0100 |
|---|---|---|
| committer | Louis Burda <quent.burda@gmail.com> | 2024-03-30 15:37:05 +0100 |
| commit | 32309e019f2ff7d9f69f3e0016f67439e81b8b30 (patch) | |
| tree | ace9fccd48489648b0586a8f84da21839632d0b9 /solve/src/form.php | |
| parent | 4007ea18f294aefb6128cbe82c5446cd8cb72c50 (diff) | |
| download | cscg24-lolpython-32309e019f2ff7d9f69f3e0016f67439e81b8b30.tar.gz cscg24-lolpython-32309e019f2ff7d9f69f3e0016f67439e81b8b30.zip | |
Rename to solve
Diffstat (limited to 'solve/src/form.php')
| -rw-r--r-- | solve/src/form.php | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/solve/src/form.php b/solve/src/form.php new file mode 100644 index 0000000..b3cc3da --- /dev/null +++ b/solve/src/form.php @@ -0,0 +1,24 @@ +<div class="jumbotron"> + <div class="container custom-container"> + <h1>LOLPython</h1> + <p>You finally landed on the mainframe and are soooo close to hack the world! But what is this? A <a href="http://www.dalkescientific.com/writings/diary/archive/2007/06/01/lolpython.html">LOLPython</a> interpreter in production? + Googling quickly reveals: Thats <a href="https://esolangs.org/wiki/Language_list">one of many esolangs</a> with hacker and l33t speak. Sounds cool, right?</p> + <p>Though, to solve this challenge, you have to take it to the next level: Not only code a program in this weird language, but escape the interpreter and execute the final payload. Go exploit it!</p> + </div> +</div> +<div class="container"> + <main role="main"> + <form> + <p>Type your LOLPython code here. We'll execute your file and you'll get the result</p> + <textarea placeholder="VISIBLE 'HAI WORLD!'" id="in"> +</textarea> + <input type="button" value="Transpile and Run!" id="rock-button" onclick="transpile();"> + + <br> + <p>Output:</p> + <textarea id="output"></textarea> + </form> + </main> + +</div> +<br><br>
\ No newline at end of file |
