Skip to content

Instantly share code, notes, and snippets.

View yomexzo's full-sized avatar

Yomi Osamiluyi yomexzo

View GitHub Profile
@SwitHak
SwitHak / 20200114-TLP-WHITE_CVE-2020-0601.md
Last active November 11, 2025 11:22
BlueTeam CheatSheet * CVE-2020-0601 * crypt32.dll | Last updated: 2020-01-21 1817 UTC

CVE-2020-0601 AKA ChainOfFools OR CurveBall

General

  • Microsoft disclosed a vulnerability in their monthly Patch Tuesday referenced under CVE-2020-0601.
  • The vulnerability was discovered by the U.S. National Security Agency, anounced today (2020-01-14) in their press conference, followed by a blog post and an official security advisory.
  • The flaw is located in the "CRYPT32.DLL" file under the C:\Windows\System32\ directory.

Vulnerability explanation

  • NSA description:
  • NSA has discovered a critical vulnerability (CVE-2020-0601) affecting Microsoft Windows® cryptographic functionality.
@karina-clio
karina-clio / gift_exchange.md
Last active March 10, 2025 17:38
Gift Exchange

Gift Exchange

Given a CSV file of friends who want to be assigned in order to exchange gifts:

  1. Write a script that processes a CSV file (use the example file below)
  2. Randomly assign givers to receivers
  3. Print each person's email followed by the email of the person they're assigned to (see example output below)

Additional requirements:

@tin-z
tin-z / VR_roadmap.md
Last active November 22, 2025 10:22
Becoming a Vulnerability Researcher roadmap: my personal experience