DigiDoc

The objective of the DigiDoc CTF challenge is to gain root access to the target server by exploiting various vulnerabilities, including FTP, web application vulnerabilities (such as upload and IDOR), and privilege escalation.

FurElise

The objective of the FurElise CTF challenge is to decode a hidden flag concealed within a PowerShell script by following a series of deobfuscation and decoding steps.

May The Force Be With You

The objective of the May The Force Be With You CTF challenge is to decipher a hidden flag encoded within a given script using reverse engineering techniques.

Small Sage

The objective of the Small Sage CTF challenge is to decipher a flag that has been encrypted using RSA encryption techniques, focusing on elements like `n`, `p`, `q`, `C`, `N`, and `e`.

Threat Hunting Challenge 1

Threat Hunting Challenge 1 CTF challenge is to investigate a ransomware-like attack scenario within a provided VM and identify the executable responsible for the encryption.

Threat Hunting Challenge 2

Threat Hunting Challenge 2 CTF challenge is to identify the SHA256 hash value of the executable responsible for exfiltrating data within a given context.encryption.

Threat Hunting Challenge 3

Threat Hunting Challenge 3 CTF challenge is to identify the significant indicator related to a potentially malicious executable based on its behavior observed through external connections.

Checkout my socials 3

The objective of the Checkout my socials 3 challenge is to gather information from publicly available sources (OSINT) to uncover the hidden flag. The challenge provides hints related to birds, and your task is to identify the Twitter or other social media account associated with the user.