2019
Description I’ve stored all of my wrestling strategies in a state-of-the-art secret vault. I even wrote it in nodeJS, can’t...
Description Why so small? nc aes.sunshinectf.org 4200 Author: ps_iclimbthings Write-up Short write-up here. The server asked for a word to...
Description Please enjoy the classical lfsr. zer0lfsr.tar.gz Attachment content chall.py keystream chall.py script from secret import init1,init2,init3,FLAG import hashlib assert(FLAG=="flag{"+hashlib.sha256(init1+init2+init3).hexdigest()+"}")...
Description Do you know ghost pepper? Let’s eat. http://111.186.63.207:31337 Write-up Vitor B2e4gl3 started the enumeration of this challenge and was...
2018
These were the steps to resolve Pwn2Win 2018’s GCM challenge, a challenge about a critical vulnerability in Python’s cryptography package....
These were the steps to solve the First Flag of Attack Step. We solved this with little time left so...
One Frida script for two Flags ASIS 2018 Gunshop and Gunshop II challenges were about an Android app. And I...