3 C2

Analyze a suspected command-and-control (C2) component discovered in a previously compromised system. Reverse engineer the binary to identify communication mechanisms, retrieve the bot token, and understand or replicate the exfiltration process.

5 Persistent

Identify evidence of attacker persistence by analyzing remnants left on a compromised system, including outbound communication artifacts such as Pastebin links. Use digital forensic techniques to trace how the attacker maintained access or control.

Sprivect

The goal of this challenge is to reverse engineer an obfuscated **Khronos SPIR-V binary**, reconstruct the logic used to generate an output image, and recover the original flag hidden within its data transformations.

notsus.exe

The goal of this challenge is to analyze and decrypt files extracted from a ZIP archive using a known plaintext attack and reverse engineer a bundled Python executable to extract the final flag.

Blink Logic

The goal of this challenge is to analyze a firmware file and determine the correct keypad input to unlock an IoT system running on Wokwi simulation.

Kapas

The goal of this challenge is to analyze a suspicious document file to uncover hidden malicious content and extract the flag.