[★★☆] Short Crypto Tales - Suibom
|
Cryptography |
3 |
|
[★★☆] Eugene’s FATigue - Is that it?
|
Forensics |
6 |
|
[★☆☆] The Chronicles of Greg 2 - Frustrating compression
|
Forensics |
3 |
|
[★☆☆] Ransomware - Recovery 3
|
Cryptography |
9 |
|
[★★☆] Short Crypto Tales - MorizOtis
|
Cryptography |
3 |
|
[★☆☆] Ransomware - Recovery 2
|
Cryptography |
3 |
|
[★☆☆] The digital trail - The escape plan
|
OSINT |
9 |
|
[★☆☆] The digital trail - The private channel
|
OSINT |
3 |
|
[★☆☆] The digital trail - The digital footprint
|
OSINT |
3 |
|
[★☆☆] The digital trail - The evidence
|
OSINT |
3 |
|
[★☆☆] The digital trail - The tip
|
OSINT |
3 |
|
[★★★] Suspect tracking - Identification
|
OSINT |
9 |
|
[★★☆] The Chronicles of Greg - SystemUpdate incident report
|
Malware Analysis and Reverse Engineering |
6 |
|
[★☆☆] Bastion - The backdoor culprit
|
Forensics |
9 |
|
[★☆☆] Bastion - Feel free to dig in
|
Forensics |
3 |
|
[★☆☆] Bastion - Clean bastion
|
Forensics |
3 |
|
[★☆☆] Bastion - Inspect the file system
|
Forensics |
3 |
|
[★☆☆] Bastion - So much just from logs
|
Forensics |
3 |
|
[★★☆] JAILE - Calculator
|
Web Exploitation and Binary Exploitation |
6 |
|
[★☆☆] Ransomware - Recovery 1
|
Cryptography |
3 |
|
[★☆☆] Adversary - Key exchange
|
Cryptography |
9 |
|
[★☆☆] Adversary - 3AES
|
Cryptography |
3 |
|
[★☆☆] Adversary - Almost Classic
|
Cryptography |
3 |
|
[☆☆☆] Advanced Decryption Standard - easy like counting up to three
|
Cryptography |
1 |
|
[☆☆☆] Advanced Decryption Standard - Blockchain
|
Cryptography |
1 |
|
[☆☆☆] Advanced Decryption Standard - Codebook
|
Cryptography |
1 |
|
[★★☆] Equestria - The Dark Ruler
|
Web Exploitation and Binary Exploitation |
6 |
|
[★★☆] Equestria - Shadow Realm
|
Web Exploitation and Binary Exploitation |
6 |
|
[★★☆] Equestria - Door To The Stable
|
Web Exploitation and Binary Exploitation |
6 |
|
[★☆☆] ConnectionChecker - Executer
|
Malware Analysis and Reverse Engineering |
9 |
|
[★☆☆] ConnectionChecker - Lies
|
Malware Analysis and Reverse Engineering |
3 |
|
[★☆☆] ConnectionChecker - Tool
|
Malware Analysis and Reverse Engineering |
3 |
|
[☆☆☆] SanityChecker - Password protected
|
Malware Analysis and Reverse Engineering |
1 |
|
[☆☆☆] SanityChecker - Bash dropper
|
Malware Analysis and Reverse Engineering |
1 |
|
[★★☆] Eugene’s FATigue - Was that the only file?
|
Forensics |
6 |
|
[☆☆☆] First Contact - Or hack their mainframe...
|
Forensics |
1 |
|
[☆☆☆] First Contact - Independence day
|
Forensics |
1 |
|
[☆☆☆] First Contact - A Day in the Strife
|
Forensics |
1 |
|
[☆☆☆] First Contact - Between 15 and 17
|
Forensics |
1 |
|
[☆☆☆] First Contact - Still fighting
|
Forensics |
1 |
|
[★★☆] Eugene’s FATigue - FATigue
|
Forensics |
6 |
|
[☆☆☆] First Contact - So long, but wait, we’re still playing!
|
Forensics |
1 |
|
[☆☆☆] First Contact - In competition with jellyfish
|
Forensics |
1 |
|
[☆☆☆] SanityChecker - Sleepy python
|
Malware Analysis and Reverse Engineering |
1 |
|
[☆☆☆] First Contact - Hard choices
|
Forensics |
1 |
|