initial commit

This commit is contained in:
Rokas Puzonas 2023-05-11 22:31:59 +03:00
commit a8f1753567
9 changed files with 102 additions and 0 deletions

3
README.md Normal file
View File

@ -0,0 +1,3 @@
# PicoCTF
https://play.picoctf.org/

41
bloat.py/bloat.flag.py Executable file
View File

@ -0,0 +1,41 @@
import sys
a = "!\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ"+ \
"[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~ "
def arg133(arg432):
if arg432 == a[71]+a[64]+a[79]+a[79]+a[88]+a[66]+a[71]+a[64]+a[77]+a[66]+a[68]:
return True
else:
print(a[51]+a[71]+a[64]+a[83]+a[94]+a[79]+a[64]+a[82]+a[82]+a[86]+a[78]+\
a[81]+a[67]+a[94]+a[72]+a[82]+a[94]+a[72]+a[77]+a[66]+a[78]+a[81]+\
a[81]+a[68]+a[66]+a[83])
sys.exit(0)
return False
def arg111(arg444):
return arg122(arg444.decode(), a[81]+a[64]+a[79]+a[82]+a[66]+a[64]+a[75]+\
a[75]+a[72]+a[78]+a[77])
def arg232():
return input(a[47]+a[75]+a[68]+a[64]+a[82]+a[68]+a[94]+a[68]+a[77]+a[83]+\
a[68]+a[81]+a[94]+a[66]+a[78]+a[81]+a[81]+a[68]+a[66]+a[83]+\
a[94]+a[79]+a[64]+a[82]+a[82]+a[86]+a[78]+a[81]+a[67]+a[94]+\
a[69]+a[78]+a[81]+a[94]+a[69]+a[75]+a[64]+a[70]+a[25]+a[94])
def arg132():
return open('flag.txt.enc', 'rb').read()
def arg112():
print(a[54]+a[68]+a[75]+a[66]+a[78]+a[76]+a[68]+a[94]+a[65]+a[64]+a[66]+\
a[74]+a[13]+a[13]+a[13]+a[94]+a[88]+a[78]+a[84]+a[81]+a[94]+a[69]+\
a[75]+a[64]+a[70]+a[11]+a[94]+a[84]+a[82]+a[68]+a[81]+a[25])
def arg122(arg432, arg423):
arg433 = arg423
i = 0
while len(arg433) < len(arg432):
arg433 = arg433 + arg423[i]
i = (i + 1) % len(arg423)
return "".join([chr(ord(arg422) ^ ord(arg442)) for (arg422,arg442) in zip(arg432,arg433)])
arg444 = arg132()
arg432 = arg232()
arg133(arg432)
arg112()
arg423 = arg111(arg444)
print(arg423)
sys.exit(0)

37
bloat.py/clean.py Normal file
View File

@ -0,0 +1,37 @@
import sys
a = "!\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~ "
def arg133(arg432):
if arg432 == "happychance":
return True
else:
print("That password is incorrect")
sys.exit(0)
return False
def arg111(arg444):
return arg122(arg444.decode(), "rapscallion")
def arg232():
return input("Please enter correct password for flag: ")
def arg132():
return open('flag.txt.enc', 'rb').read()
def arg112():
print("Welcome back... your flag, user:")
def arg122(arg432, arg423):
arg433 = arg423
i = 0
while len(arg433) < len(arg432):
arg433 = arg433 + arg423[i]
i = (i + 1) % len(arg423)
return "".join([chr(ord(arg422) ^ ord(arg442)) for (arg422,arg442) in zip(arg432,arg433)])
arg444 = arg132()
arg432 = arg232()
arg133(arg432)
arg112()
arg423 = arg111(arg444)
print(arg423)
sys.exit(0)

BIN
bloat.py/flag.txt.enc Normal file

Binary file not shown.

BIN
information/cat.jpg Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 858 KiB

1
mod-26/flag.enc Normal file
View File

@ -0,0 +1 @@
cvpbPGS{arkg_gvzr_V'yy_gel_2_ebhaqf_bs_ebg13_MAZyqFQj}

16
mod-26/main.py Normal file
View File

@ -0,0 +1,16 @@
def decrypt(flag_enc: str) -> str:
offset = 13
flag = ""
for letter in flag_enc:
if letter.isalpha():
if letter.isupper():
flag += chr((ord(letter) - ord('A') - offset) % 26 + ord('A'))
else:
flag += chr((ord(letter) - ord('a') - offset) % 26 + ord('a'))
else:
flag += letter
return flag
flag_enc = open("flag.enc").read()
print(decrypt(flag_enc))

1
obedient-cat/flag Normal file
View File

@ -0,0 +1 @@
picoCTF{s4n1ty_v3r1f13d_b5aeb3dd}

3
obedient-cat/solution.md Normal file
View File

@ -0,0 +1,3 @@
```sh
cat flag
```