|
Password Pandemonium
|
Cryptography |
10 |
|
|
Not (De)Bugging Me
|
Reverse Engineering |
20 |
|
|
Catch Me If You Can
|
OSINT |
20 |
|
|
Trust but Verify
|
Cryptography |
45 |
|
|
Rendezvous Redirect
|
Cryptography |
20 |
|
|
Iconic
|
Misc |
25 |
|
|
SOAP
|
Forensics |
15 |
|
|
Play Ball
|
OSINT |
45 |
|
|
Bots? Still no Bots!
|
Web Security |
45 |
|
|
How Good is the Privacy?
|
Cryptography |
25 |
|
|
Double the Fun
|
Cryptography |
25 |
|
|
Bytes from Life
|
Forensics |
45 |
|
|
Twin Trouble
|
Cryptography |
15 |
|
|
Through the Looking Glass 1
|
OSINT |
10 |
|
|
Ghost in the Wires
|
Steganography |
65 |
|
|
Log Leak
|
Steganography |
30 |
|
|
Silent Segment
|
Steganography |
30 |
|
|
Do You Believe in Magic
|
Forensics |
35 |
|
|
Buried Bytes
|
Forensics |
30 |
|
|
Rolling the Dice
|
Math |
15 |
|
|
Counting Cards
|
Math |
15 |
|
|
Bias Detection
|
Math |
10 |
|
|
Let's Go Sledding
|
Binary Exploitation |
25 |
|
|
Bug Out
|
Malware |
5 |
|
|
Data Structures 2
|
Programming |
25 |
|
|
Objectively Malicious
|
Forensics |
5 |
|
|
Need Time to Process
|
Windows |
10 |
|
|
Less Complicated
|
Misc |
10 |
|
|
Got Joke?
|
Misc |
10 |
|
|
Logic Chamber
|
Misc |
10 |
|
|
QWERTY
|
Misc |
5 |
|
|
Fundamental Truth
|
Misc |
5 |
|
|
DNS Basics
|
Networking |
5 |
|
|
Data Structures 1
|
Programming |
25 |
|
|
Libraries as Far as the Eye Can See
|
Programming |
15 |
|
|
The Godfather
|
Malware |
5 |
|
|
Call of the WinAPI
|
Malware |
15 |
|
|
Family Matters
|
Malware |
10 |
|
|
YARAmageddon
|
Malware |
30 |
|
|
No Bots Allowed
|
Web Security |
40 |
|
|
Trusted by All
|
Cryptography |
5 |
|
|
The Unchanging Identifier
|
Windows |
10 |
|
|
Signal Boost
|
Math |
5 |
|
|
Logical Identity
|
Math |
5 |
|
|
Zero-Click
|
Binary Exploitation |
15 |
|
|
Now You've Gone Too Far
|
Binary Exploitation |
15 |
|
|
Strings on Disk
|
Forensics |
35 |
|
|
Top Secret 2
|
Steganography |
10 |
|
|
Top Secret 1
|
Steganography |
5 |
|
|
Gain Access
|
|
0 |
|