2024 Cyber Apocalypse: Delulu
Exploit format string vulnerability to overwrite target variable
2024 Cyber Apocalypse: Pwn Tutorial
Answer integer overflow questions to retrieve the flag
2024 Cyber Apocalypse: Writing on the Wall
Exploit off-by-one vulnerability and strcmp null byte behavior
2023 Business CTF: Contempt - Revenge
Full system compromise requiring exploitation chain through multiple vulnerabilities
2023 Business CTF: Device Control
Exploit a device control server to manipulate devices or gain system access.
2023 Business CTF: PAC Breaker
Exploit a surveillance system tracking application by bypassing file restrictions and causing heap corruption.
2023 Business CTF: Hackback
Exploit a Command and Control (C2) service by exploiting vulnerabilities in its bot management system.
2023 Business CTF: Snow Scan
Bypass a bitmap scanning application by crafting a malicious BMP file to trigger code execution.
2023 Cyber Apocalypse: Questionnaire
Buffer overflow via fgets() vulnerability in vulnerable C binary
2023 Cyber Apocalypse: Getting Started
Buffer overflow exploitation using controlled payload delivery