Skip to content

Instantly share code, notes, and snippets.

View ky28059's full-sized avatar
πŸ₯°

Kevin Yu ky28059

πŸ₯°
View GitHub Profile

HeroCTF v7 β€” Revoked (+ Revenge)

Your budget request for the new company personnel index has been declined. Instead, the intern has received a very small bonus in exchange for a homemade solution.

Show them their stinginess could cost them.

The chall maker forgot to remove a debug account... Here is the revenge challenge without this backdoor!

We're given a Python server that looks like this:

import os

BuckeyeCTF 2025 β€” packages

Explore the world of debian/debian-based packages.

https://packages.challs.pwnoh.io

We're given a Python server that looks like this:

import sqlite3
import json
from flask import Flask, request, render_template_string

Infobahn CTF'25 β€” speechless

wow i'm in jail??? i'm speechless...

nc speechless.challs.infobahnc.tf 1337

We're given a Python server that looks like this:

#!/usr/bin/python3

allowed = "ab.=-/"

m0leCon Teaser CTF 2025 β€” Precipice

Have you ever played bala...precipice???

nc precipice.challs.m0lecon.it 14615

We're given a lengthy Python interface that looks like this:

#!/usr/bin/env python3

from numpy import float32

UIUCTF 2025 β€” Upload, Upload, and Away!

Keeping track of all these files makes me so dizzy I feel like I'm floating in space.

Instancer url: https://upload-upload-and-away.chal.uiuc.tf/

Flag format: uiuctf{[a-z_]+}

We're given a TypeScript server that looks like this:

SDCTF 2025 β€” triglot

You think you know programming? You think you know languages? heh... as if πŸ™„

Come back to me when you can write a program that runs in the 3 deadly P's: Perl, Python, and (P)Javascript

Connect with nc -q 2 -N 52.8.15.62 8001

Flag is located at ./flag.txt

Hack the Madness CTF Round 2 β€” broken production

Our PHP devs are working on this employee management portal. We have a mock build of the website and you are to pentest the platform for weaknesses. Your goal is to get more privileges and command execution on the server.

We're given a PHP server that looks like this:

<?php
spl_autoload_register(function ($name){
    if (preg_match('/Controller$/', $name))
    {
        $name = "controllers/${name}";

PwnMe CTF Quals 2025 β€” Hack the bot 1

I've developed a little application to help me with my pentest missions, with lots of useful payloads! I even let users add new payloads, but since I was in a rush I didn't have time to test the security of my application, could you take care of it ?

We're given an express server that looks like this:

const express = require('express');
const path = require('path');
const fs = require('fs');
const { spawn } = require('child_process');
const puppeteer = require('puppeteer');

m0leCon Beginner CTF 2024 β€” PIETcture

Paint by Numbers? Or perhaps, compute by pixels?

We're given an image that looks like this:

PIETcture

Based on the challenge name, this is a program written in the esolang Piet. Then, we can import the program into an online Piet IDE and try running it:

LakeCTF '24-'25 Quals β€” VerySusOrganization

You have been hired to contribute to a very suspicious project. Follow the link below to get onboard.

https://challs.polygl0ts.ch:8123

We're given access to an organization that looks like this:

image

Besides the random projects, of note are two repositories: