Skip to content

Instantly share code, notes, and snippets.

View nick3499's full-sized avatar
🏠
Working from home

nick3499 nick3499

🏠
Working from home
  • USA
View GitHub Profile
@nick3499
nick3499 / tunn3l_v1s10n.md
Last active January 23, 2022 16:51
tunn3l v1s10n

picoCTF: tunn3l v1s10n

Intro

One surgical procedure for the ethical hacker is to use scalpel to fix tunn3l v1s10n.

Tool: Scalpel

In the /etc/scalpel/scalpel.conf configuration file of the scalpel tool, uncomment the following line:

@nick3499
nick3499 / encode_decode_rot47.py
Last active January 19, 2022 18:34
crackme-py
#!/bin/python3
'''Encode or decode ROT47'''
# Any spaces are left unchanged.
def rot47(string):
'''Encode/decode string.'''
enc_dec = '' # string encoded/decoded to/from ROT47
for char in string:
ascii_code = ord(char) # convert character to ASCII code number
@nick3499
nick3499 / matryoshka.md
Created January 14, 2022 12:15
Matryoshka doll

picoCTF: Matryoshka doll

picoCTF's Matryoshka challenge provides a dolls.jpg file which contains nested files that can be accessed using the unzip tool.

Unzip Nested Files

┌──(kali㉿kali)-[~/Desktop]
└─$ unzip dolls.jpg
Archive:  dolls.jpg
@nick3499
nick3499 / keygenme.py
Last active January 13, 2022 21:19
keygenme-py
#!/bin/python3
'''Print picoCTF flag for “keygenme-py” challenge.'''
import hashlib
user = b'GOUGH'
nums = [4, 5, 3, 6, 2, 7, 1, 8]
flag_1 = 'picoCTF{1n_7h3_|<3y_of_'
flag_2 = ''
flag_3 = '}'
@nick3499
nick3499 / tab-tab-attack.md
Created January 12, 2022 06:52
Tab, Tab, Attack

picoCTF: Tab, Tab, Attack

Zip File

Use curl to download Addadshashanammu.zip, then unzip it.

$ unzip Addadshashanammu.zip           
Archive: Addadshashanammu.zip
@nick3499
nick3499 / kali-tip.sh
Created January 12, 2022 05:45
Print Random Kali Tip
#!/bin/zsh
# print random string from list of Kali terminal arg tips
# color formats
GRN="\e[1;32m"
YEL="\e[1;33m"
BLU="\e[1;34m"
END="\e[0m"
# kali tips
@nick3499
nick3499 / static-aint-always-noise.md
Created January 11, 2022 21:26
Static ain't always noise

picoCTF: Static ain't always noise

picoCTF's Static ain't always noise was very easy since I was well-acquainted with Linux distros. Two files were provided:

  • ltdis.sh
  • static

ltdis.sh

ltdis.sh is a shell script written in Bash for the disassembly of compiled code.

@nick3499
nick3499 / mind-ps-qs.md
Last active January 11, 2022 21:28
Mind your Ps and Qs

picoCTF: Mind your Ps and Qs

PicoCTF's Mind your Ps and Qs challenge includes a hyperlink to a text file:

Decrypt my super sick RSA:
c: 62324783949134119159408816513334912534343517300880137691662780895409992760262021
n: 1280678415822214057864524798453297819181910621573945477544758171055968245116423923
e: 65537  
@nick3499
nick3499 / generate_color_pattern.py
Created November 25, 2021 03:33
Generate Symmetrical Color Pattern: Python: random.randint(), Bash color formatting, color schemes
#!/bin/python3
'''Generate Symmetrical Random Color art.'''
from random import randint
SCHEMES = {
'1': ['264653', '2a9d8f', 'e9c46a', 'f4a261', 'e76f51'],
'2': ['cb997e', 'ddbea9', 'ffe8d6', 'b7b7a4', 'a5a58d', '6b705c'],
'3': ['03045e', '023e8a', '0077b6', '0096c7', '00b4d8', '48cae4', '90e0ef',
'ade8f4', 'caf0f8'],
@nick3499
nick3499 / pickle_test.py
Created November 2, 2021 22:45
Pickle Test: dict(), pickle, unpickle, serialize, deserialize, with open()
import pickle
example_dict = {'one': '1', 'two': '2', 'three': '3', 'four': '4', 'five': '5', 'six': '6', 'seven': '7'}
with open('dict_pickle', 'wb') as pickle_out:
pickle.dump(example_dict, pickle_out)
print('\x1b[32mPrint pickled or serialized dictionary:\x1b[0m\n')
with open('/home/nick/Desktop/dict_pickle', 'rb') as file_out: