Challenges
31 challenges
Vice Auth
Inspired by authentication mechanisms in modern malware, this challenge implements a cipher-based proof-of-work system....
Malware Style Obfuscation
Final boss. Modeled after real IoT malware like Mozi. Ciphertext:
Matryoshka Payload
Like Russian nesting dolls, each layer reveals another. Ciphertext:
Inflate the Truth
Zlib is gzips cousin - commonly used in HTTP compression and many file formats. Ciphertext:
Compressed Thoughts
Malware authors love compression. The magic bytes 1f 8b are your friend. Ciphertext:
Double Trouble
Sometimes attackers apply the same encoding multiple times to evade detection. Simple but effective. Ciphertext: