Activities
Hash Length Extension tool
One of my first projects was an automated tool implementing the Hash Length Extension attack for SHA-1, SHA-2, and MD families. I created it while learning how to manually implement such attack. It ain't much, but it's honest workš§āš¾.
View
HTB Main Platform CTF
What started as my first attempt to create a crypto CTF is now an active challenge on Hack The Box, titled "Infosekurus Query". Itās categorized as a Medium challenge, and the overall feedback has been mostly positive. Give it a try!
View
Hash Functions in Python
During a CTF, I needed an implementation of SHA-256 to experiment with its internal functions. Instead of using one from GitHub, I decided to implement my own after reading a couple of papers (later discovering there were YouTube videos :/). At the time, it felt like an accomplishment (despite being fairly easy), which eventually led me to implement all the SHA-1, SHA-2, and MD families. Oh well, a project is a project, no matter its difficulty or uniqueness.
View
CTF Contribution at PCSC
The Panhellenic Cybersecurity Student Competition is a CTF event that has been running for the past two years, allowing all Greek students under 18 to participate. Its goal is to introduce them to cybersecurity through beginner-friendly challenges. Along with others, I contributed some challenges in Crypto, Forensics, and Reverse Engineering.
View