
PicoCTF – Corrupted File
Challenge_Author: Jeffery John Description People keep trying to trick my players with imitation flags. I want to make sure they get the real thing! I’m going to provide the SHA-256 hash and a de...

Challenge_Author: Jeffery John Description People keep trying to trick my players with imitation flags. I want to make sure they get the real thing! I’m going to provide the SHA-256 hash and a de...

Hash Crack Challenge Author: Nana Ama Atombo-Sackey Category: Cryptography Description A company stored a secret message on a server which got breached due to the admin using weakly hashed pass...

PIE Time Challenge_Author: Darkraicg492 Category: Binary Exploitation Description Can you try to get the flag? Beware we have PIE! Additional details will be available after launching your chal...

DISKO 1 Challenge_Author: Darkraicg492 Category : Forensics Description Can you find the flag in this disk image?Download the disk image here. Process Download the file from the PicoCTF we...

Corrupted File Challenge_Author: Yahaya Meddy Category: Forensics Description This file seems broken… or is it? Maybe a couple of bytes could make all the difference. Can you figure out how to ...

Challenge_Author: Prince Niyonshuti N. Category: Forensics Description The SOC team discovered a suspiciously large log file after a recent breach. When they opened it, they found an enormous bl...

Challenge Author: Yahaya Meddy Category: Forensics Description You’re given a seemingly ordinary JPG image. Something is tucked away out of sight inside the file. Your task is to discover the hi...

SSTI-1 {Server-Side-Template-Injection-1} Challenge Author: Venax Category: Web-Exploitation Description I made a cool website where you can announce whatever you want! Try it out! Additional ...

Description Hi, intrepid investigator! 📄🔍 You’ve stumbled upon a peculiar PDF filled with what seems like nothing more than garbled nonsense. But beware! Not everything is as it appears. Amidst th...

Crack the Gate 1 Challenge Author: Yahaya Meddy Description We’re in the middle of an investigation. One of our persons of interest, ctf player, is believed to be hiding sensitive data inside a ...