The objective of the FurElise CTF challenge is to decode a hidden flag concealed within a PowerShell script by following a series of deobfuscation and decoding steps.
The objective of the May The Force Be With You CTF challenge is to decipher a hidden flag encoded within a given script using reverse engineering techniques.
The objective of the Small Sage CTF challenge is to decipher a flag that has been encrypted using RSA encryption techniques, focusing on elements like `n`, `p`, `q`, `C`, `N`, and `e`.
Threat Hunting Challenge 1 CTF challenge is to investigate a ransomware-like attack scenario within a provided VM and identify the executable responsible for the encryption.
Threat Hunting Challenge 2 CTF challenge is to identify the SHA256 hash value of the executable responsible for exfiltrating data within a given context.encryption.
Threat Hunting Challenge 3 CTF challenge is to identify the significant indicator related to a potentially malicious executable based on its behavior observed through external connections.
The objective of the Checkout my socials 1 challenge is to gather information from publicly available sources (OSINT) to identify the username. You will be provided with a link, and your task is to find the username associated with it.
The objective of the Checkout my socials 3 challenge is to gather information from publicly available sources (OSINT) to uncover the hidden flag. The challenge provides hints related to birds, and your task is to identify the Twitter or other social media account associated with the user.
The objective of the Cryptic Raven challenge is to decrypt a given message, which is encoded using an undisclosed encryption technique. Your task is to decipher the message and reveal the hidden flag.
The objective of the Getmecorrect challenge is to reverse engineer an APK file to uncover a hidden flag. The flag is divided into four parts, and you need to understand how these parts are constructed. However, a key part of the flag is implemented using native code, which is not available in the APK's source code. Your task is to find a way to retrieve the missing part of the flag.