|
Wordse... needles in a haystack
|
Programming |
50 |
|
|
Secret XORbit
|
Cryptography |
15 |
|
|
Microbit 2
|
Physical Challenges |
10 |
|
|
Shuffle up, down, and all around
|
Reverse Engineering |
5 |
|
|
Port Authority 3
|
OSINT |
20 |
|
|
Memory Lane 1: Cold Start
|
Binary Exploitation |
20 |
|
|
In the Event of My Demise
|
Reverse Engineering |
15 |
|
|
Printer's Dilemma
|
Reverse Engineering |
10 |
|
|
42? Really?
|
Reverse Engineering |
10 |
|
|
Wireshark B
|
Web Security |
10 |
|
|
Port Authority 2
|
OSINT |
10 |
|
|
Port Authority 1
|
OSINT |
20 |
|
|
Wordsearch
|
Programming |
5 |
|
|
Freq 4
|
Cryptography |
15 |
|
|
Nohtyp
|
Reverse Engineering |
5 |
|
|
Wireshark A
|
Web Security |
5 |
|
|
Broken HTTPS?
|
Web Security |
10 |
|
|
Sekrit: The Album
|
Forensics |
10 |
|
|
Shutdown Shenanigans
|
Forensics |
10 |
|
|
Seasick
|
Forensics |
15 |
|
|
Buff-er What?
|
Binary Exploitation |
10 |
|
|
HID-den Capture
|
Binary Exploitation |
10 |
|
|
Microbit 1
|
Physical Challenges |
5 |
|
|
index.html
|
Steganography |
5 |
|
|
Batman
|
Steganography |
10 |
|
|
Same... but Different
|
Programming |
5 |
|
|
Slithery Snake
|
Programming |
5 |
|
|
Bacon
|
Steganography |
15 |
|
|
Modulo: It's What's Left Over
|
Math |
5 |
|