Skip to content

Instantly share code, notes, and snippets.


George O Ge0rg3

Block or report user

Report or block Ge0rg3

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
Ge0rg3 / sysctl.conf
Last active Nov 12, 2019
ideal sysctl.conf
View sysctl.conf
fs.protected_hardlinks = 1
fs.protected_symlinks = 1
fs.suid_dumpable = 0
kernel.core_uses_pid = 1
kernel.dmesg_restrict = 1
kernel.kptr_restrict = 2
kernel.panic = 60
kernel.panic_on_oops = 60
kernel.perf_event_paranoid = 2
kernel.randomize_va_space = 2
Ge0rg3 /
Created Apr 15, 2019
Solution to Sunshine CTF 2019's Entry Exam challenge.
from PIL import Image, ImageDraw
from io import BytesIO
from math import floor
import requests as rq
import time
filepath = "/home/george/"
questionUrl = ""
x1 = 337
Ge0rg3 / generate.php
Created Apr 15, 2019
Sunshine CTF 2019's generate.php file, from the Wrestler Name Generator challenge.
View generate.php
$whitelist = array(
// if this page is accessed from the web server, the flag is returned
// flag is in env variable to avoid people using XXE to read the flag
// REMOTE_ADDR field is able to be spoofed (unless you already are on the server)
if(in_array($_SERVER['REMOTE_ADDR'], $whitelist)){
from Crypto.Cipher import AES
from itertools import product
import binascii
for val in product(range(256), repeat=2):
key = bytes(val)*8
cipher =, AES.MODE_ECB)
msg = cipher.encrypt("hellothisisatest")
z = binascii.hexlify(msg).decode('utf-8')
if z == "d9bf38ed407349d227b859eac20d5394":
Ge0rg3 /
Created Apr 10, 2019
Solving Sunshine CTF 2019's Time Warp challenge.
from socket import socket
nums = []
def recv(sock):
try: data = sock.recv(1024).decode()
except: data = ""
return data
Ge0rg3 /
Created Apr 9, 2019
A tool for bruteforcing the SHA256 hash leaderboard code, as part of HMGCC's BLK_BOX challenge
from hashlib import sha256
from itertools import product
hash = "B4BFAF4A11C4C962C46ECC384D799B26FF26AC60684FE1C5396364DFA20103D0".lower()
combos = ['k8', 'SK', 'jL', 'CN', '76', 'L5', 'OR', 'AW', 'x1', '7I', 'L5', '43']
checkFlag = lambda flag: hash == sha256(''.join(flag).encode()).hexdigest()
sequences = product(*combos)
Ge0rg3 /
Created Apr 8, 2019
Bruteforce 4 byte XOR encryption. Made for HMGCC's BLK_BOX challenge.
alphabet = [i for i in range(32, 127)]+[10]
getEnglish = lambda text: list(filter(lambda c: c in alphabet, text))
isEnglish = lambda text: len(getEnglish(text)) == len(text)
with open('msg', 'rb') as f:
encrypted =
samples = []
for i in range(4):
samples.append([val for index, val in enumerate(encrypted) if index % 4 == i])
Ge0rg3 / Zenith.html
Created Feb 1, 2019
Gynvael's Winter GameDev Challenge 2018/19
View Zenith.html
<meta charset="UTF-8">
html, body {
margin: 0px;
padding: 0px;
/*[]=10&l[]=1 */
@font-face {
Ge0rg3 / logmonitor.c
Created Dec 15, 2018
A redacted file from the Waldo machine on HTB.
View logmonitor.c
*This is an application to print out common log files
#include "logMonitor.h"
void printUsage() {
printf("Usage: %s [-aAbdDfhklmsw] [--help]\n", PROGRAMNAME);
Ge0rg3 /
Created Dec 15, 2018
A directory enumeration script for the Waldo HTB machine through LFI.
import requests as rq
import sys, os
url = ""
startdir = "./.../...//.../...//.../...//"
currentdir = startdir
print("#########"*4+"\n# Directory traversal file reader. #\n# Commands: cd, ls, cat & clear. #\n"+"#########"*4)
while True:
You can’t perform that action at this time.