Skip to content

Instantly share code, notes, and snippets.

View yomexzo's full-sized avatar

Yomi Osamiluyi yomexzo

View GitHub Profile
@tin-z
tin-z / VR_roadmap.md
Last active March 26, 2025 06:33
Becoming a Vulnerability Researcher roadmap: my personal experience
@karina-clio
karina-clio / gift_exchange.md
Last active March 10, 2025 17:38
Gift Exchange

Gift Exchange

Given a CSV file of friends who want to be assigned in order to exchange gifts:

  1. Write a script that processes a CSV file (use the example file below)
  2. Randomly assign givers to receivers
  3. Print each person's email followed by the email of the person they're assigned to (see example output below)

Additional requirements:

@SwitHak
SwitHak / 20200114-TLP-WHITE_CVE-2020-0601.md
Last active February 9, 2024 14:42
BlueTeam CheatSheet * CVE-2020-0601 * crypt32.dll | Last updated: 2020-01-21 1817 UTC

CVE-2020-0601 AKA ChainOfFools OR CurveBall

General

  • Microsoft disclosed a vulnerability in their monthly Patch Tuesday referenced under CVE-2020-0601.
  • The vulnerability was discovered by the U.S. National Security Agency, anounced today (2020-01-14) in their press conference, followed by a blog post and an official security advisory.
  • The flaw is located in the "CRYPT32.DLL" file under the C:\Windows\System32\ directory.

Vulnerability explanation

  • NSA description:
  • NSA has discovered a critical vulnerability (CVE-2020-0601) affecting Microsoft Windows® cryptographic functionality.