Activities

Activities

Image 1

Hash Length Extension tool

One of my first projects was an automated tool implementing the Hash Length Extension attack for SHA-1, SHA-2, and MD families. I created it while learning how to manually implement such attack. It ain't much, but it's honest workšŸ§‘ā€šŸŒ¾.


View
Image 1

HTB Main Platform CTF

What started as my first attempt to create a crypto CTF is now an active challenge on Hack The Box, titled "Infosekurus Query". Itā€™s categorized as a Medium challenge, and the overall feedback has been mostly positive. Give it a try!


View
Image 1

Hash Functions in Python

During a CTF, I needed an implementation of SHA-256 to experiment with its internal functions. Instead of using one from GitHub, I decided to implement my own after reading a couple of papers (later discovering there were YouTube videos :/). At the time, it felt like an accomplishment (despite being fairly easy), which eventually led me to implement all the SHA-1, SHA-2, and MD families. Oh well, a project is a project, no matter its difficulty or uniqueness.


View
Image 1

CTF Contribution at PCSC

The Panhellenic Cybersecurity Student Competition is a CTF event that has been running for the past two years, allowing all Greek students under 18 to participate. Its goal is to introduce them to cybersecurity through beginner-friendly challenges. Along with others, I contributed some challenges in Crypto, Forensics, and Reverse Engineering.


View