Challenges
34 challenges
LockBit
Inspired by obfuscation techniques used in the LockBit ransomware family, this challenge implements a multi-layer...
Phantom
Inspired by encryption techniques used in the Phantom malware family, this challenge implements a cipher algorithm to...
Vidar
Inspired by encryption techniques used in the Vidar malware family, this challenge implements a cipher algorithm to...
Vice Auth
Inspired by authentication mechanisms in modern malware, this challenge implements a cipher-based proof-of-work system....
Malware Style Obfuscation
Final boss. Modeled after real IoT malware like Mozi. Ciphertext:
Matryoshka Payload
Like Russian nesting dolls, each layer reveals another. Ciphertext: