[★★☆] JAILE2 - Blazing-fast, memory-safe interpreter
|
Web Exploitation and Binary Exploitation |
18 |
|
[★★☆] JAILE2 - dictFS
|
Web Exploitation and Binary Exploitation |
6 |
|
[★★☆] The Chronicles of Greg - The Blob Whisperer
|
Malware Analysis and Reverse Engineering |
6 |
|
[★☆☆] Bastion - The backdoor culprit
|
Forensics |
9 |
|
[★☆☆] Bastion - Feel free to dig in
|
Forensics |
3 |
|
[★☆☆] Bastion - Clean bastion
|
Forensics |
3 |
|
[★★☆] The Chronicles of Greg - SystemUpdate incident report
|
Malware Analysis and Reverse Engineering |
6 |
|
[★☆☆] Bastion - Inspect the file system
|
Forensics |
3 |
|
[★☆☆] Bastion - So much just from logs
|
Forensics |
3 |
|
[★★☆] JAILE2 - The Tasty Bun
|
Web Exploitation and Binary Exploitation |
6 |
|
[★★☆] JAILE2 - Calculator v2
|
Web Exploitation and Binary Exploitation |
6 |
|
[★★☆] JAILE - Final Escape
|
Web Exploitation and Binary Exploitation |
18 |
|
[★★★] Elliptic - 3 Curves and mysterious story
|
Cryptography |
27 |
|
[★★★] Elliptic - How to break so many bits?
|
Cryptography |
9 |
|
[★★☆] Equestria - Final Curse
|
Web Exploitation and Binary Exploitation |
18 |
|
[★★☆] Eugene’s FATigue - Wrapping it up
|
Forensics |
18 |
|
[★★☆] Eugene’s FATigue - It tastes like a poem
|
Forensics |
6 |
|
[★★☆] Equestria - The Dark Ruler
|
Web Exploitation and Binary Exploitation |
6 |
|
[★★☆] Equestria - Shadow Realm
|
Web Exploitation and Binary Exploitation |
6 |
|
[★★★] Suspect tracking - Golden Hour
|
OSINT |
27 |
|
[★★★] Suspect tracking - Localization
|
OSINT |
9 |
|
[☆☆☆] First Contact - Or hack their mainframe...
|
Forensics |
1 |
|
[☆☆☆] First Contact - Independence day
|
Forensics |
1 |
|
[☆☆☆] First Contact - A Day in the Strife
|
Forensics |
1 |
|
[☆☆☆] First Contact - Between 15 and 17
|
Forensics |
1 |
|
[☆☆☆] First Contact - Still fighting
|
Forensics |
1 |
|
[☆☆☆] First Contact - So long, but wait, we’re still playing!
|
Forensics |
1 |
|
[☆☆☆] First Contact - In competition with jellyfish
|
Forensics |
1 |
|
[☆☆☆] First Contact - Hard choices
|
Forensics |
1 |
|
[☆☆☆] SanityChecker - Password protected
|
Malware Analysis and Reverse Engineering |
1 |
|
[☆☆☆] SanityChecker - Bash dropper
|
Malware Analysis and Reverse Engineering |
1 |
|
[☆☆☆] SanityChecker - Sleepy python
|
Malware Analysis and Reverse Engineering |
1 |
|
[☆☆☆] Advanced Decryption Standard - easy like counting up to three
|
Cryptography |
1 |
|
[☆☆☆] Advanced Decryption Standard - Blockchain
|
Cryptography |
1 |
|
[☆☆☆] Advanced Decryption Standard - Codebook
|
Cryptography |
1 |
|
[★★★] Elliptic - Simple curve definition
|
Cryptography |
9 |
|
[★★★] Suspect tracking - Identification
|
OSINT |
9 |
|
[★★☆] Equestria - Door To The Stable
|
Web Exploitation and Binary Exploitation |
6 |
|
[★★☆] Eugene’s FATigue - Was that the only file?
|
Forensics |
6 |
|
[★★☆] Eugene’s FATigue - Is that it?
|
Forensics |
6 |
|
[★☆☆] Ransomware - Recovery 3
|
Cryptography |
9 |
|
[★☆☆] Ransomware - Recovery 2
|
Cryptography |
3 |
|
[★☆☆] Adversary - Key exchange
|
Cryptography |
9 |
|
[★☆☆] ConnectionChecker - Executer
|
Malware Analysis and Reverse Engineering |
9 |
|
[★☆☆] Adversary - 3AES
|
Cryptography |
3 |
|
[★☆☆] ConnectionChecker - Lies
|
Malware Analysis and Reverse Engineering |
3 |
|
[★☆☆] ConnectionChecker - Tool
|
Malware Analysis and Reverse Engineering |
3 |
|
[★☆☆] Ransomware - Recovery 1
|
Cryptography |
3 |
|
[★★☆] JAILE - User
|
Web Exploitation and Binary Exploitation |
6 |
|
[★★☆] JAILE - Calculator
|
Web Exploitation and Binary Exploitation |
6 |
|
[★★☆] Eugene’s FATigue - FATigue
|
Forensics |
6 |
|
[★☆☆] Adversary - Almost Classic
|
Cryptography |
3 |
|