|
Double the Fun
|
Cryptography |
25 |
|
|
Password Pandemonium
|
Cryptography |
10 |
|
|
Trusted by All
|
Cryptography |
5 |
|
|
Enigma 2
|
Physical |
10 |
|
|
Enigma 1
|
Physical |
5 |
|
|
Caesar Wheel 2
|
Physical |
10 |
|
|
Caesar Wheel 1
|
Physical |
5 |
|
|
Icar(e) About Security
|
Malware |
15 |
|
|
Call of the WinAPI
|
Malware |
15 |
|
|
Data Structures 2
|
Programming |
25 |
|
|
Data Structures 1
|
Programming |
25 |
|
|
Bug Out
|
Malware |
5 |
|
|
Family Matters
|
Malware |
10 |
|
|
Signal Boost
|
Math |
5 |
|
|
Now You've Gone Too Far
|
Binary Exploitation |
15 |
|
|
Zero-Click
|
Binary Exploitation |
15 |
|
|
Bias Detection
|
Math |
10 |
|
|
Fundamental Truth
|
Misc |
5 |
|
|
The Unchanging Identifier
|
Windows |
10 |
|
|
Lock Picking
|
Physical |
5 |
|
|
Bots? Still no Bots!
|
Web Security |
45 |
|
|
No Bots Allowed
|
Web Security |
40 |
|
|
Counting Cards
|
Math |
15 |
|
|
Base Palindrome
|
Math |
10 |
|
|
Rolling the Dice
|
Math |
15 |
|
|
Libraries as Far as the Eye Can See
|
Programming |
15 |
|
|
The Godfather
|
Malware |
5 |
|
|
Top Secret 2
|
Steganography |
10 |
|
|
Top Secret 1
|
Steganography |
5 |
|
|
Gain Access
|
|
0 |
|