This repository contains Python scripts and solutions for various PicoCTF challenges. It serves as a resource for learning and applying Python in Capture The Flag (CTF) competitions, focusing on cryptography, reverse engineering, forensics, and automation.
- 🔹 Cryptography – Solving encryption/decryption challenges.
- 🔹 Reverse Engineering – Analyzing binaries with Python.
- 🔹 Forensics – Extracting hidden data from files.
- 🔹 Exploitation – Automating interactions with remote services.
Ensure you have Python installed:
python3 --version
If it is not installed, get it from Python.org.
git clone https://github.com/Ephraim67/Python-in-CTFs-PiccoCTF.git
cd Python-in-CTFs-PiccoCTF
If any challenge requires additional libraries, install them using:
pip install -r requirements.txt
python3 challenge_script.py
from base64 import b64decode
encoded = "U2VjcmV0IEZsYWc=" # Example base64 encoded string
decoded = b64decode(encoded).decode()
print(decoded) # Output: Secret Flag
import socket
host, port = "jupiter.challenges.picoctf.org", 64287
s = socket.socket()
s.connect((host, port))
print(s.recv(1024).decode()) # Receive and print flag
s.close()
If you'd like to contribute:
- Fork the repo
- Create a new branch:
git checkout -b my-feature
- Commit your changes:
git commit -m "Added new challenge solution"
- Push and open a Pull Request
This project is open-source and licensed under the MIT License.