CTF Writeups
CTF Challenge: CipherQR
EasyScan Me
CTF Challenge: RustFixMe1
EasyHave you heard of Rust? Fix the syntax errors in this Rust file to print the flag!
CTF Challenge: Information
EasyFiles can always be changed in a secret way. Can you find the flag?
CTF Challenge: flagAreStepic
MediumA group of underground hackers might be using this legit site to communicate. Use your forensic techniques to uncover their message
TryHackMe Challenge: rootMe
MediumA ctf for beginners, can you root me?
PicoCTF Challenge: EvenRsaCanBeBroken
EasyThis service provides you an encrypted flag. Can you decrypt it with just N & e?
PicoCTF Challenge: GDB Test Drive
MediumCan you get the flag?
PicoCTF Challenge: GDB Baby Step1
MediumCan you figure out what is in the eax register at the end of the main function?
PicoCTF Challenge: GDB Baby Step2
MediumCan you figure out what is in the eax register at the end of the main function?
PicoCTF Challenge: ARMseembly4
HardWhat integer does this program print with argument 3459413018? File: chall_4.S Flag format: picoCTF{XXXXXXXX} -> (hex, lowercase, no 0x, and 32 bits. ex. 5614267 would be picoCTF{0055aabb})
PicoCTF Challenge: More SQLi
MediumCan you find the flag on this website.
PicoCTF Challenge: SQLiLite
MediumCan you login to this website?
HackTheBox Lab: Responder
EasyRemote File Inclusion and how to use Web/Reverse Shells.
HackTheBox Lab: Three
Easyhow to upload files to an S3 Bucket & web exploitation
CTF Challenge: Operation Oni
MediumDownload this disk image, find the key and log into the remote machine.
CTF Challenge: ARMssembly 1
MediumFor what argument does this program print `win` with variables 83, 0 and 3?
CTF Challenge: ARMssembly 0
MediumWhat integer does this program print with arguments 182476535 and 3742084308?
CTF Challenge: ARMssembly 2
HardWhat integer does this program print with argument 2403814618?