Skip to content

Instantly share code, notes, and snippets.

💫
uno

George O Ge0rg3

💫
uno
Block or report user

Report or block Ge0rg3

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@Ge0rg3
Ge0rg3 / sysctl.conf
Last active Nov 12, 2019
ideal sysctl.conf
View sysctl.conf
fs.protected_hardlinks = 1
fs.protected_symlinks = 1
fs.suid_dumpable = 0
kernel.core_uses_pid = 1
kernel.dmesg_restrict = 1
kernel.kptr_restrict = 2
kernel.panic = 60
kernel.panic_on_oops = 60
kernel.perf_event_paranoid = 2
kernel.randomize_va_space = 2
@Ge0rg3
Ge0rg3 / entryExam.py
Created Apr 15, 2019
Solution to Sunshine CTF 2019's Entry Exam challenge.
View entryExam.py
from PIL import Image, ImageDraw
from io import BytesIO
from math import floor
import requests as rq
import time
filepath = "/home/george/"
questionUrl = "http://archive.sunshinectf.org:19005/exam"
x1 = 337
@Ge0rg3
Ge0rg3 / generate.php
Created Apr 15, 2019
Sunshine CTF 2019's generate.php file, from the Wrestler Name Generator challenge.
View generate.php
<?php
$whitelist = array(
'127.0.0.1',
'::1'
);
// if this page is accessed from the web server, the flag is returned
// flag is in env variable to avoid people using XXE to read the flag
// REMOTE_ADDR field is able to be spoofed (unless you already are on the server)
if(in_array($_SERVER['REMOTE_ADDR'], $whitelist)){
View 16-bit-aes-bruteforce.py
from Crypto.Cipher import AES
from itertools import product
import binascii
for val in product(range(256), repeat=2):
key = bytes(val)*8
cipher = AES.new(key, AES.MODE_ECB)
msg = cipher.encrypt("hellothisisatest")
z = binascii.hexlify(msg).decode('utf-8')
if z == "d9bf38ed407349d227b859eac20d5394":
@Ge0rg3
Ge0rg3 / timeWarp.py
Created Apr 10, 2019
Solving Sunshine CTF 2019's Time Warp challenge.
View timeWarp.py
from socket import socket
nums = []
def recv(sock):
try: data = sock.recv(1024).decode()
except: data = ""
print(data)
return data
@Ge0rg3
Ge0rg3 / leaderboardCodeBruteforce.py
Created Apr 9, 2019
A tool for bruteforcing the SHA256 hash leaderboard code, as part of HMGCC's BLK_BOX challenge
View leaderboardCodeBruteforce.py
from hashlib import sha256
from itertools import product
hash = "B4BFAF4A11C4C962C46ECC384D799B26FF26AC60684FE1C5396364DFA20103D0".lower()
combos = ['k8', 'SK', 'jL', 'CN', '76', 'L5', 'OR', 'AW', 'x1', '7I', 'L5', '43']
checkFlag = lambda flag: hash == sha256(''.join(flag).encode()).hexdigest()
sequences = product(*combos)
@Ge0rg3
Ge0rg3 / 4byte-xor-bruteforce.py
Created Apr 8, 2019
Bruteforce 4 byte XOR encryption. Made for HMGCC's BLK_BOX challenge.
View 4byte-xor-bruteforce.py
alphabet = [i for i in range(32, 127)]+[10]
getEnglish = lambda text: list(filter(lambda c: c in alphabet, text))
isEnglish = lambda text: len(getEnglish(text)) == len(text)
with open('msg', 'rb') as f:
encrypted = f.read()
samples = []
for i in range(4):
samples.append([val for index, val in enumerate(encrypted) if index % 4 == i])
@Ge0rg3
Ge0rg3 / Zenith.html
Created Feb 1, 2019
Gynvael's Winter GameDev Challenge 2018/19
View Zenith.html
<head>
<title>Game</title>
<meta charset="UTF-8">
<style>
html, body {
margin: 0px;
padding: 0px;
}
/* https://www.dafont.com/typecast.font?l[]=10&l[]=1 */
@font-face {
@Ge0rg3
Ge0rg3 / logmonitor.c
Created Dec 15, 2018
A redacted file from the Waldo machine on HTB.
View logmonitor.c
/*******************************************
*
*This is an application to print out common log files
*
********************************************/
#include "logMonitor.h"
void printUsage() {
printf("Usage: %s [-aAbdDfhklmsw] [--help]\n", PROGRAMNAME);
@Ge0rg3
Ge0rg3 / WaldoDirEnum.py
Created Dec 15, 2018
A directory enumeration script for the Waldo HTB machine through LFI.
View WaldoDirEnum.py
import requests as rq
import sys, os
url = "http://10.10.10.87/"
headers={'Content-Type':'application/x-www-form-urlencoded'}
startdir = "./.../...//.../...//.../...//"
currentdir = startdir
print("#########"*4+"\n# Directory traversal file reader. #\n# Commands: cd, ls, cat & clear. #\n"+"#########"*4)
while True:
You can’t perform that action at this time.