#!/usr/bin/env bash echo -e "p4ssw0rd\n!MALICIOUS MESSAGE!" \ | ./vulnerable.py > /tmp/msg.gpg gpg -d --pinentry-mode loopback --passphrase p4ssw0rd /tmp/msg.gpg #set -ex #(echo -e "p4ssw0rd\n{\"admin\": true }" | \ # gpg --symmetric -a --pinentry-mode loopback --batch --passphrase-fd 0) \ # > bad.gpg #(echo "p4ssw0rd"; cat bad.gpg) | ./vulnerable.py harmless_user