finals

Analyze the finals artifacts to reverse engineer a .NET malware chain, decrypt C2-delivered DLL payloads, and recover the flag.

quack-bot

Analyze a Kramer-encrypted PYC binary and its staged shellcode to extract the final payload and recover the flag.

0 - Zero

Locate and extract the flag by investigating a provided file or image (`zero:welcome`). The goal is to navigate the user profile and identify credentials or indicators of compromise from accessible paths.

10 - Ten

Exploit a vulnerable login form in OWASP Juice Shop using classic SQL Injection techniques to retrieve the flag.

15 - Fifteen

Interact with a restricted terminal environment and extract the contents of the `flag.txt` file using limited command-line capabilities.