Skip to content

Instantly share code, notes, and snippets.

View ky28059's full-sized avatar
πŸ₯°

Kevin Yu ky28059

πŸ₯°
View GitHub Profile

m0leCon Teaser CTF 2025 β€” Precipice

Have you ever played bala...precipice???

nc precipice.challs.m0lecon.it 14615

We're given a lengthy Python interface that looks like this:

#!/usr/bin/env python3

from numpy import float32

UIUCTF 2025 β€” Upload, Upload, and Away!

Keeping track of all these files makes me so dizzy I feel like I'm floating in space.

Instancer url: https://upload-upload-and-away.chal.uiuc.tf/

Flag format: uiuctf{[a-z_]+}

We're given a TypeScript server that looks like this:

SDCTF 2025 β€” triglot

You think you know programming? You think you know languages? heh... as if πŸ™„

Come back to me when you can write a program that runs in the 3 deadly P's: Perl, Python, and (P)Javascript

Connect with nc -q 2 -N 52.8.15.62 8001

Flag is located at ./flag.txt

Hack the Madness CTF Round 2 β€” broken production

Our PHP devs are working on this employee management portal. We have a mock build of the website and you are to pentest the platform for weaknesses. Your goal is to get more privileges and command execution on the server.

We're given a PHP server that looks like this:

<?php
spl_autoload_register(function ($name){
    if (preg_match('/Controller$/', $name))
    {
        $name = "controllers/${name}";

PwnMe CTF Quals 2025 β€” Hack the bot 1

I've developed a little application to help me with my pentest missions, with lots of useful payloads! I even let users add new payloads, but since I was in a rush I didn't have time to test the security of my application, could you take care of it ?

We're given an express server that looks like this:

const express = require('express');
const path = require('path');
const fs = require('fs');
const { spawn } = require('child_process');
const puppeteer = require('puppeteer');

m0leCon Beginner CTF 2024 β€” PIETcture

Paint by Numbers? Or perhaps, compute by pixels?

We're given an image that looks like this:

PIETcture

Based on the challenge name, this is a program written in the esolang Piet. Then, we can import the program into an online Piet IDE and try running it:

LakeCTF '24-'25 Quals β€” VerySusOrganization

You have been hired to contribute to a very suspicious project. Follow the link below to get onboard.

https://challs.polygl0ts.ch:8123

We're given access to an organization that looks like this:

image

Besides the random projects, of note are two repositories:

1337UP LIVE CTF 2024 β€” Private Github Repository

Bob Robizillo created a public instructions for Tiffany, so she can start work on new secret project. can you access the secret repository?

We're not given a whole lot to work with. Howver, googling "Bob Robizillo" nets us this public Gist:

image

Dear Tiffany,

I hope this message finds you well. To streamline our collaboration on the 1337up repository, I kindly ask you to add the enclosed SSH key to your account. This step is crucial for enabling a seamless forking process and enhancing our project efficiency.

1337UP LIVE CTF 2024 β€” Pizza Paradise

Something weird going on at this pizza store!!

https://pizzaparadise.ctf.intigriti.io

We're given a simple pizza chain website looking like this:

image

Looking at the source code, CSS, and images, nothing seems out of the ordinary. However, going to robots.txt,