Instantly share code, notes, and snippets.

💫
uno

# George OGe0rg3

💫
uno
• Sort options
Last active Nov 12, 2019
ideal sysctl.conf
View sysctl.conf
 fs.protected_hardlinks = 1 fs.protected_symlinks = 1 fs.suid_dumpable = 0 kernel.core_uses_pid = 1 kernel.dmesg_restrict = 1 kernel.kptr_restrict = 2 kernel.panic = 60 kernel.panic_on_oops = 60 kernel.perf_event_paranoid = 2 kernel.randomize_va_space = 2
Created Apr 15, 2019
Solution to Sunshine CTF 2019's Entry Exam challenge.
View entryExam.py
 from PIL import Image, ImageDraw from io import BytesIO from math import floor import requests as rq import time filepath = "/home/george/" questionUrl = "http://archive.sunshinectf.org:19005/exam" x1 = 337
Created Apr 15, 2019
Sunshine CTF 2019's generate.php file, from the Wrestler Name Generator challenge.
View generate.php

Created Apr 10, 2019
16 bit AES bruteforce challenge for Sunshine CTF '19 https://2019.sunshinectf.org/challenges#16-bit-AES
View 16-bit-aes-bruteforce.py
 from Crypto.Cipher import AES from itertools import product import binascii for val in product(range(256), repeat=2): key = bytes(val)*8 cipher = AES.new(key, AES.MODE_ECB) msg = cipher.encrypt("hellothisisatest") z = binascii.hexlify(msg).decode('utf-8') if z == "d9bf38ed407349d227b859eac20d5394":
Created Apr 10, 2019
Solving Sunshine CTF 2019's Time Warp challenge.
View timeWarp.py
 from socket import socket nums = [] def recv(sock): try: data = sock.recv(1024).decode() except: data = "" print(data) return data
Created Apr 9, 2019
A tool for bruteforcing the SHA256 hash leaderboard code, as part of HMGCC's BLK_BOX challenge
 from hashlib import sha256 from itertools import product hash = "B4BFAF4A11C4C962C46ECC384D799B26FF26AC60684FE1C5396364DFA20103D0".lower() combos = ['k8', 'SK', 'jL', 'CN', '76', 'L5', 'OR', 'AW', 'x1', '7I', 'L5', '43'] checkFlag = lambda flag: hash == sha256(''.join(flag).encode()).hexdigest() sequences = product(*combos)
Created Apr 8, 2019
Bruteforce 4 byte XOR encryption. Made for HMGCC's BLK_BOX challenge.
View 4byte-xor-bruteforce.py
 alphabet = [i for i in range(32, 127)]+[10] getEnglish = lambda text: list(filter(lambda c: c in alphabet, text)) isEnglish = lambda text: len(getEnglish(text)) == len(text) with open('msg', 'rb') as f: encrypted = f.read() samples = [] for i in range(4): samples.append([val for index, val in enumerate(encrypted) if index % 4 == i])
Created Feb 1, 2019
Gynvael's Winter GameDev Challenge 2018/19
View Zenith.html
 Game
Created Dec 15, 2018
A redacted file from the Waldo machine on HTB.
View logmonitor.c
 /******************************************* * *This is an application to print out common log files * ********************************************/ #include "logMonitor.h" void printUsage() { printf("Usage: %s [-aAbdDfhklmsw] [--help]\n", PROGRAMNAME);
Created Dec 15, 2018
A directory enumeration script for the Waldo HTB machine through LFI.
View WaldoDirEnum.py
 import requests as rq import sys, os url = "http://10.10.10.87/" headers={'Content-Type':'application/x-www-form-urlencoded'} startdir = "./.../...//.../...//.../...//" currentdir = startdir print("#########"*4+"\n# Directory traversal file reader. #\n# Commands: cd, ls, cat & clear. #\n"+"#########"*4) while True:
You can’t perform that action at this time.