Challenges
23 challenges
LockBit
Inspired by obfuscation techniques used in the LockBit ransomware family, this challenge implements a multi-layer...
Cyclix
Inspired by real-world malware obfuscation techniques, this challenge implements a cyclic encryption routine to hide...
AMOS
Inspired by real-world obfuscation techniques used in the AMOS Stealer malware, this challenge hides a flag using a...
Legacy Auth
An old authentication daemon was discovered running on an internal server. The sysadmin claims it's been there "since...
Matryoshka Payload
Like Russian nesting dolls, each layer reveals another. Ciphertext:
Inflate the Truth
Zlib is gzips cousin - commonly used in HTTP compression and many file formats. Ciphertext: