The challenge involves decrypting a given ciphertext to obtain the flag.
The challenge involves exploiting a Local File Inclusion (LFI) vulnerability to retrieve a flag.
The objective of the Compromised CTF challenge is to extract a hidden flag embedded within a complex set of files and directories.
The objective of the Linux Memory Usage CTF challenge is to efficiently manage and process memory usage data for different processes based on given inputs.
The objective of the Lokami Temple CTF challenge is to navigate a graph problem by determining the shortest path for all doors to exit.
The objective of the DigiDoc CTF challenge is to gain root access to the target server by exploiting various vulnerabilities, including FTP, web application vulnerabilities (such as upload and IDOR), and privilege escalation.
The objective of the FurElise CTF challenge is to decode a hidden flag concealed within a PowerShell script by following a series of deobfuscation and decoding steps.
The objective of the May The Force Be With You CTF challenge is to decipher a hidden flag encoded within a given script using reverse engineering techniques.
The objective of the Small Sage CTF challenge is to decipher a flag that has been encrypted using RSA encryption techniques, focusing on elements like `n`, `p`, `q`, `C`, `N`, and `e`.
Threat Hunting Challenge 1 CTF challenge is to investigate a ransomware-like attack scenario within a provided VM and identify the executable responsible for the encryption.