Skip to content

Instantly share code, notes, and snippets.

@Kliprmimo
Kliprmimo / prac_proj_1.md
Last active October 8, 2025 14:01
prac_proj_1.md

Tytuł i Cel pracy

Wysoko skalowalna platforma CTF w dziedzinie podatności binarnych
Celem pracy jest stworzenie platformy, na której osoby zainteresowane cyberbezpieczeństwem będą mogły rozpocząć swoją przygodę z Binary Exploitation - sposobem na wykożystanie podatności w plikach wykonywalnych, na niskim poziomie.

Literatura

Capture the Flag as Cyber Security Introduction

https://ieeexplore.ieee.org/document/7427865

  • cited 43
  • 2016 49th Hawaii International Conference on System Sciences (HICSS)

An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments

sudo apt-get update
sudo apt-get install -y curl git build-essential cmake unzip ripgrep fd-find
# Node.js
curl -fsSL https://deb.nodesource.com/setup_23.x -o nodesource_setup.sh
sudo -E bash nodesource_setup.sh
sudo apt-get install -y nodejs
# Go
sudo mkdir -p /usr/local/go
---
Language: Cpp
# BasedOnStyle: LLVM
AccessModifierOffset: -2
AlignAfterOpenBracket: Align
AlignArrayOfStructures: None
AlignConsecutiveMacros: None
AlignConsecutiveAssignments: None
AlignConsecutiveBitFields: None
AlignConsecutiveDeclarations: None
@Kliprmimo
Kliprmimo / scanner.py
Created March 13, 2025 13:10
threaded port scanner
import socket
import threading
import queue
import typing
MAX_THREADS = 100
print_lock = threading.Lock()
class Scanner:
import sys
from PIL import Image, ExifTags
def get_exif_data(image_path, exif_data):
try:
with Image.open(image_path) as img:
exif = img._getexif()
if exif is not None:
new_exif = dict()
for tag, value in exif.items():