michael-schofield
Michael Schofield This was a binary exploitation problem, but it was actually just a Python jail. Description T-Bag: “You think you’re the smartest man in the room?” Michael: “No. But I don’t n...
Michael Schofield This was a binary exploitation problem, but it was actually just a Python jail. Description T-Bag: “You think you’re the smartest man in the room?” Michael: “No. But I don’t n...
twowrite A binary exploitation problem from Imaginary CTF 2025 Description double the writes from last year Provided files: vuln nsjail.cfg vuln.c Makefile flag.txt (for testing) Do...
Microcontroller CTF Description Microcontroller CTF is a web-based CTF site focused on binary exploitation of embedded devices, particularly fictional door locks using the MSP430 architecture, dev...
Description Initial analysis Payload Script Running Description This program mishandles memory. Can you exploit it to get the flag? Download the binary he...
Description Initial analysis Flag Description Here is a binary that has enough privilege to read the content of the flag file but will only let you know its hash. If o...
Description Initial analysis Exploit Flag Description Here is a binary that has enough privilege to read the content of the flag file but will only let you know ...
Initial analysis Debugging Script Crypto problem! Initial analysis In Ghidra, there are only a few available functions, but one is suspiciously called after it i...
Summary Predicting rand Buffer overflow Leaking ASLR Shellcode Exploit Flag Summary This binary is a back-to-basics problem featuring the follo...
Finding the Vulnerability Planning the Exploit Exploit Finding the Vulnerability We are given a JavaScript file which prevents flag from being showh in searches: ...
Introduction Task 4 Task 5 Task 6 Task 7 Task 15 Task 16 Task 28 Introduction I was invited to this CTF by a colleague, but I participate...