This reversing challenge presents a stripped x86-64 ELF binary alongside an encoded text file. The objective is to reverse-engineer the encoding mechanism used to obfuscate the hidden message and recover the flag. The challenge…
This reversing challenge presents a stripped x86-64 ELF binary alongside an encoded text file. The objective is to reverse-engineer the encoding mechanism used to obfuscate the hidden message and recover the flag. The challenge…
This challenge presents an Android APK file for a rewards application called "Magic Snowfall Rewards". The application implements a tiered rewards system where users can collect "snowfall points" and progress through different membership…
This challenge presents an Android APK file for a rewards application called "Magic Snowfall Rewards". The application implements a tiered rewards system where users can collect "snowfall points" and progress through different membership…
This challenge presents an Android APK file (FrozenGift.apk) that implements a tiered membership system for a fictional "Frozen Gift Shop". The application features two membership tiers: Snowflake Basic - The default tier for all users Frost…
This challenge presents an Android APK file (FrozenGift.apk) that implements a tiered membership system for a fictional "Frozen Gift Shop". The application features two membership tiers: Snowflake Basic - The default tier for all users Frost…
This challenge involves reverse engineering an Android banking application (Ebank.apk) to discover and access a hidden "Premium" feature that contains a multi-part obfuscated flag. The challenge demonstrates a classic Android security…
This challenge involves reverse engineering an Android banking application (Ebank.apk) to discover and access a hidden "Premium" feature that contains a multi-part obfuscated flag. The challenge demonstrates a classic Android security…
A maximum severity Content-Type confusion vulnerability in n8n enables unauthenticated attackers to read arbitrary files, forge admin access, and execute remote commands. On January 7, 2026, security researchers…
A maximum severity Content-Type confusion vulnerability in n8n enables unauthenticated attackers to read arbitrary files, forge admin access, and execute remote commands. On January 7, 2026, security researchers…
In this Sherlock scenario, we are tasked with investigating a high-priority incident on a secondary MongoDB server named mongodbsync. The administrator suspects a compromise linked to a vulnerability called "MongoBleed" (CVE-2025-14847).…
In this Sherlock scenario, we are tasked with investigating a high-priority incident on a secondary MongoDB server named mongodbsync. The administrator suspects a compromise linked to a vulnerability called "MongoBleed" (CVE-2025-14847).…
This challenge is a classic mobile application static analysis task. You are given an Android APK that looks like a harmless help center application. The intended learning objective is to recognize that mobile apps are often shipped…
This challenge is a classic mobile application static analysis task. You are given an Android APK that looks like a harmless help center application. The intended learning objective is to recognize that mobile apps are often shipped…
PHANTOM presents an “elliptic curve PRNG” that claims to be secure because the Elliptic Curve Discrete Logarithm Problem (ECDLP) is hard. The service exposes: Elliptic curve parameters and two public points G and Q Several truncated PRNG outputs…
PHANTOM presents an “elliptic curve PRNG” that claims to be secure because the Elliptic Curve Discrete Logarithm Problem (ECDLP) is hard. The service exposes: Elliptic curve parameters and two public points G and Q Several truncated PRNG outputs…
This cryptography challenge presents us with a ciphertext encrypted using a linear transformation function. The challenge description explicitly hints that the encryption is "a function, not a shift," which immediately suggests an affine…
This cryptography challenge presents us with a ciphertext encrypted using a linear transformation function. The challenge description explicitly hints that the encryption is "a function, not a shift," which immediately suggests an affine…
This challenge exploits CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability affecting React Server Functions as implemented in Next.js applications. The vulnerability, colloquially known as "React2Shell", stems from…
This challenge exploits CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability affecting React Server Functions as implemented in Next.js applications. The vulnerability, colloquially known as "React2Shell", stems from…
This challenge presents a classical cryptography problem involving the Playfair cipher, one of the first practical digraph substitution ciphers invented by Charles Wheatstone in 1854. The Playfair cipher encrypts pairs of letters…
This challenge presents a classical cryptography problem involving the Playfair cipher, one of the first practical digraph substitution ciphers invented by Charles Wheatstone in 1854. The Playfair cipher encrypts pairs of letters…
This forensic challenge provides a single capture file (chall.pcap) from an industrial sensor network. The story is that the network has been compromised and the attacker is “hiding” something inside the traffic. From a defender’s perspective, this is a…
This forensic challenge provides a single capture file (chall.pcap) from an industrial sensor network. The story is that the network has been compromised and the attacker is “hiding” something inside the traffic. From a defender’s perspective, this is a…
The forensics challenge name "HBH" is a direct hint pointing to IPv6 Hop-by-Hop Options Header, one of the extension headers defined in the IPv6 protocol (RFC 8200). The Hop-by-Hop Options Header is an IPv6 extension header that carries optional…
The forensics challenge name "HBH" is a direct hint pointing to IPv6 Hop-by-Hop Options Header, one of the extension headers defined in the IPv6 protocol (RFC 8200). The Hop-by-Hop Options Header is an IPv6 extension header that carries optional…
This challenge is a follow-up to "orakel-von-hxp" and presents a bare-metal ARM Cortex-M3 exploitation scenario running on QEMU's lm3s6965evb machine emulation. The target firmware implements a simple "oracle" service that accepts user questions…
This challenge is a follow-up to "orakel-von-hxp" and presents a bare-metal ARM Cortex-M3 exploitation scenario running on QEMU's lm3s6965evb machine emulation. The target firmware implements a simple "oracle" service that accepts user questions…
This challenge presents a bare-metal ARM Cortex-M3 firmware running on QEMU's lm3s6965evb board emulation. The firmware implements an "oracle" service that reads user input via UART0 and uses a Mersenne Twister PRNG to provide "answers" by reading…
This challenge presents a bare-metal ARM Cortex-M3 firmware running on QEMU's lm3s6965evb board emulation. The firmware implements an "oracle" service that reads user input via UART0 and uses a Mersenne Twister PRNG to provide "answers" by reading…
This challenge presents a classic shellcoding problem with a twist: instead of writing shellcode to spawn a shell or read a file, we must write ultra-compact x86-64 shellcode that performs Base64 decoding. The challenge runs our shellcode inside the…
This challenge presents a classic shellcoding problem with a twist: instead of writing shellcode to spawn a shell or read a file, we must write ultra-compact x86-64 shellcode that performs Base64 decoding. The challenge runs our shellcode inside the…
This challenge presents a Web3-based NFT access control system combining: A Solidity ERC1155 NFT Registry (NftRegistry.sol) - A smart contract that manages NFT sales with different price tiers A Python Flask Backend (challenge.py) - A web service that…
This challenge presents a Web3-based NFT access control system combining: A Solidity ERC1155 NFT Registry (NftRegistry.sol) - A smart contract that manages NFT sales with different price tiers A Python Flask Backend (challenge.py) - A web service that…
The "heist" challenge presents a custom multivariate quadratic (MQ) signature scheme. We are provided with a public key consisting of 42 quadratic polynomials in 123 variables over the field GF(256). The goal is to forge a valid signature for a message…
The "heist" challenge presents a custom multivariate quadratic (MQ) signature scheme. We are provided with a public key consisting of 42 quadratic polynomials in 123 variables over the field GF(256). The goal is to forge a valid signature for a message…
The "worrier" challenge presents a cryptosystem based on isogenies between elliptic curves over a finite field. The security relies on the hardness of recovering a secret scalar used in a linear combination of torsion points, obscured by an "error" term.…
The "worrier" challenge presents a cryptosystem based on isogenies between elliptic curves over a finite field. The security relies on the hardness of recovering a secret scalar used in a linear combination of torsion points, obscured by an "error" term.…
"Dateiservierer2" is a web exploitation challenge that involves a Go-based file server application. It is a sequel to "Dateiservierer", sharing the same core architecture but introducing a mitigation attempt in the form of environment variable…
"Dateiservierer2" is a web exploitation challenge that involves a Go-based file server application. It is a sequel to "Dateiservierer", sharing the same core architecture but introducing a mitigation attempt in the form of environment variable…
"Dateiservierer" is a web challenge written in Go that acts as a file server and proxy. The application consists of two main components: Frontend (frontend.go): Handles user sessions, spawns backend processes (ds), and proxies requests to them via…
"Dateiservierer" is a web challenge written in Go that acts as a file server and proxy. The application consists of two main components: Frontend (frontend.go): Handles user sessions, spawns backend processes (ds), and proxies requests to them via…