Skip to content

cDenton1/Extra-Files

Repository files navigation

Extra Files

This repository is used for storing any files I create to solve any CTF challenges or online practice

Labeling convention: Event Platform - Name of Event/Challenge

Platform Acronym
In Person Event ip
TryHackMe thm
CryptoHack ch
OverTheWire otw
PicoCTF pctf

Related Challenges and Files

Madness - TryHackMe

  • thm-Madness.py: Python file used for finding the required secret number during the challenge
  • Read more about the program and challenge on my blog, Madness Writeup - TryHackMe

Introduction to CryptoHack - CryptoHack

  • XORprop.py: XOR Properties, computing the flag from 4 provided hex strings using XOR
  • faveByte.py: Favourite Byte, decrypting provided hex-encoded string to find the flag

That's The Ticket - TryHackMe

MagpieCTF 2025 - In Person Event

  • All-Ends-Same.py: All Ends Same, RSA crypto challenge to retrieve the flag using the provided private key
  • Grey-Area.py: Grey Area, decrypt the ciphertext via the factoring n attack method
  • Imp3rf3ct.py: Imp3rf3ct, decrypt the ciphertext via the cube root attack method
  • Inverse-Converse.py: Inverse Converse, decrypt the ciphertext using the provided c and k values
  • Read more about each challenge on my blog, MagpieCTF 2025

Bandit - OverTheWire

  • bandit24.sh: Shell script used for completing level 23 -> 24
  • bandit25.sh: Shell script used for completing level 24 -> 25
  • bandit25-a2.sh: More complex shell script for completing level 24 -> 25
  • Read about my experience and writeup for each level on my blog, Bandit Writeup - OverTheWire

Vault Door Series - PicoCTF

  • vd1-solution.py: Converted an array from Java into Python to reconstrust the scrambled password
  • vd3-solution.py: Reversed engineered Java source code to reconstrust the password
  • vd4-asciiToText.py: Convert ascii output from another command into human readable text
  • vd5-solution.py: Take the encoded string, decode from base64 and then url decode it, and print the password

CyberSci Nationals 2025 - In Person Event

  • solution-256.py, quick script whipped up for solving a cryptography challenge
  • Read all about the event and other challenges over on my blog, CyberSci Nationals 2025

AL1C3 1N PWND3RLAND CTF - In Person Event

  • extractFromPDF.py: Written to extract an embedded ZIP archive from a PDF file
  • To read a little about the event, check out my blog post, AL1C3 1N PWND3RLAND

About

Repository to store any files created for solving any CTF challenges

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published