Dynamic Secret
Use strace to trace the runtime syscalls of a binary and read the secret it loads from a file.
Use strace to trace the runtime syscalls of a binary and read the secret it loads from a file.
Bypass a character-level bash filter by substituting ASCII letters with Unicode homoglyphs that the shell normalizes.
Identify and work around a Python variable shadowing bug where a function definition overwrites a string variable of the same name.
Automate extraction of 3000 nested zip files to retrieve the flag from the innermost archive.
Connect to a server that fires 2049 arithmetic challenges in Italian — SOMMA, DIFFERENZA, PRODOTTO, POTENZA, DIVISIONE_INTERA — and solve each one in under the timeout to receive the flag.
A JSON-framed server demands conversions between base64, hex, and binary in both encode and decode directions. Write a bot that parses the Italian operation description and returns the correct transformed value.
Open the PNG in binary mode, locate the ASCII string ‘flag’ in the raw byte stream, and print every byte after that index — the flag is embedded verbatim in the file’s binary content.
The GIF has wrong magic bytes at the start. Replace the first 13 bytes with the correct GIF89a header, open the repaired file with Pillow, and iterate through frames saved as WebP to find the flag.
Decode a Morse code file, strip hex prefixes, convert to binary, interpret as Base64, then apply a Caesar shift derived from the first character — five transforms chained together.
A WAV file carries the flag in Morse code audio. Decode it automatically with morse-audio-decoder and wrap the result in flag{…}.