Exploit a vulnerability to retrieve information about other users, including the flag.
Exploit a Local File Inclusion (LFI) vulnerability to retrieve the flag.
A writeup of the cryptography challenge KeepJohn from FSIIECTF 2024. The challenge required using Munger to guess passwords.
Exploit an SQL injection vulnerability to retrieve admin credentials and obtain the flag.
Exploit insecure deserialization to gain shell access and retrieve the flag.
Analyse linux file system
The objective of the Brute Force Frenzy CTF challenge is reverse engineer a binary to find the correct key for verification.
The objective of the Character Journey CTF challenge is to find and retrieve the flag from a web application by exploiting IDOR.
The objective of the Just A Normal EXE CTF challenge is analyze a malware file to find the flag.