flag-lottery
flag lottery Summary I was able to solve this challenge with the help of two of my teammates, who we will call Research and Development. The problem revolves around leaking bits in a character-s...
flag lottery Summary I was able to solve this challenge with the help of two of my teammates, who we will call Research and Development. The problem revolves around leaking bits in a character-s...
Michael Schofield This was a binary exploitation problem, but it was actually just a Python jail. Description T-Bag: “You think you’re the smartest man in the room?” Michael: “No. But I don’t n...
twowrite A binary exploitation problem from Imaginary CTF 2025 Description double the writes from last year Provided files: vuln nsjail.cfg vuln.c Makefile flag.txt (for testing) Do...
Microcontroller CTF Description Microcontroller CTF is a web-based CTF site focused on binary exploitation of embedded devices, particularly fictional door locks using the MSP430 architecture, dev...
Description Initial analysis Payload Script Running Description This program mishandles memory. Can you exploit it to get the flag? Download the binary he...
Description Initial analysis Flag Description Here is a binary that has enough privilege to read the content of the flag file but will only let you know its hash. If o...
Description Initial analysis Exploit Flag Description Here is a binary that has enough privilege to read the content of the flag file but will only let you know ...
Initial analysis Debugging Script Crypto problem! Initial analysis In Ghidra, there are only a few available functions, but one is suspiciously called after it i...
Summary Predicting rand Buffer overflow Leaking ASLR Shellcode Exploit Flag Summary This binary is a back-to-basics problem featuring the follo...
Finding the Vulnerability Planning the Exploit Exploit Finding the Vulnerability We are given a JavaScript file which prevents flag from being showh in searches: ...