HOME
CTF WALKTHROUGHS
PENETRATION TESTING
NETWORK ADMINISTRATION & SECURITY
DIGITAL FORENSICS
GAUSSIAN ELIMINATION ROW PIVOTING
CONTACT & GITHUB LINK
CTF Walthroughs
Reverse Engineering
Simple reverse engineering - strops
Simple reverse engineering - postage
Simple reverse engineering - numerix
Simple reverse engineering - recurse
Simple reverse engineering - bridge of death
Simple reverse engineering - dora
Reverse engineering - hand rolled cryptex
Reverse engineering - heterograms
Pwn
Simple buffer overflow - boffin
Simple buffer overflow with reverse engineering - lockbox
.got.plt table - git got good
Buffer overflow and stack execution - school
ROP gadgets theory - inspector
Use after free vulnerability, tcache poisoning, and ROP gadgets - uaf-22.04
Overflow vulnerability, tcache poisoning, and ROP gadgets - overflow-22.04
Web
SQL Injection - log me in
Blind SQL Injection - log me in again
XXE vulnerability - SVG text extractor
PHP file inclusion vulnerability - Inclusion
Command injection vulnerability - ping me
Crypto
Single byte XOR - sbxor
Multi byte XOR - mbxor
Small exponent - rsa1
Common modulus attack - rsa2
CBC padding oracle attack - cbc
Assembly
Assembly Crash Course Solutions for pwn.college