All

rgbCTF: Too Slow

I’ve made this flag decryptor! It’s super secure, but it runs a little slow.

rgbCTF: icanhaz

can u haz a meaningful career in cybersecurity tool development? we hope so!

rgbCTF: Hallo?

The flag is exactly as decoded. No curly brackets.

redpwnCTF: static-pastebin

I wanted to make a website to store bits of text, but I don’t have any experience with web development. However, I realized that I don’t need any! If you experience any issues, make a paste and send it here

NahamCTF: Time Keeper

There is some interesting stuff on this website. Or at least, I thought there was…

NahamCTF: Localghost

BooOooOooOOoo! This spooOoOooky client-side cooOoOode sure is scary! What spoOoOoOoky secrets does he have in stooOoOoOore??

NahamCTF: Glimpse

There’s not a lot to work with on this server. But there is something…

NahamCTF: Finsta

This time we have a username. Can you track down NahamConTron?

NahamCTF: Alkatraz

We are so restricted here in Alkatraz. Can you help us break out?

DefenitCTF: MoM’s Touch

We’re given a binary called momsTouch for this challenge. When we run this binary, we get the following message:

HackPack: Treasure

Visiting https://treasure-map.cha.hackpack.club/robots.txt we can see the following:

HackPack: SSME

Connecting to the vulnerable message encryption service returns a small User Interface:

HackPack: Quote of the Day

We are given a client to connect to cha.hackpack.club:41709. Loading the client up gives us a simple user interface to work with:

HackPack: Paster

Visiting https://paster.cha.hackpack.club gives us a text box to enter input into. All input is truncated, and returned to the screen, giving us a pretty good idea that this’ll be a XSS vulnerability. Trying a variable of difficult payloads (<script src=, <iframe src=,

HackPack: jsclean

We’re given a python script as reference, and an address to connect to:

HackPack: Custom UI

Visiting https://custom-ui.cha.hackpack.club gives us a user interface, where we can enter RGB values for a button, along with its text. Catching the request and setting “xdata=’” in the POST request gives us the following error:

Hackpack - Birthday

Visiting https://online-birthday-party.cha.hackpack.club/account.php and signing up for a new account takes us to a page where we can see what other users share our birthday.

Back to Top ↑

NahamCTF

NahamCTF: Time Keeper

There is some interesting stuff on this website. Or at least, I thought there was…

NahamCTF: Localghost

BooOooOooOOoo! This spooOoOooky client-side cooOoOode sure is scary! What spoOoOoOoky secrets does he have in stooOoOoOore??

NahamCTF: Glimpse

There’s not a lot to work with on this server. But there is something…

NahamCTF: Finsta

This time we have a username. Can you track down NahamConTron?

NahamCTF: Alkatraz

We are so restricted here in Alkatraz. Can you help us break out?

Back to Top ↑

HackTheBox

Back to Top ↑

HackPackCTF

HackPack: Treasure

Visiting https://treasure-map.cha.hackpack.club/robots.txt we can see the following:

HackPack: SSME

Connecting to the vulnerable message encryption service returns a small User Interface:

HackPack: Quote of the Day

We are given a client to connect to cha.hackpack.club:41709. Loading the client up gives us a simple user interface to work with:

HackPack: Paster

Visiting https://paster.cha.hackpack.club gives us a text box to enter input into. All input is truncated, and returned to the screen, giving us a pretty good idea that this’ll be a XSS vulnerability. Trying a variable of difficult payloads (<script src=, <iframe src=,

HackPack: jsclean

We’re given a python script as reference, and an address to connect to:

HackPack: Custom UI

Visiting https://custom-ui.cha.hackpack.club gives us a user interface, where we can enter RGB values for a button, along with its text. Catching the request and setting “xdata=’” in the POST request gives us the following error:

Hackpack - Birthday

Visiting https://online-birthday-party.cha.hackpack.club/account.php and signing up for a new account takes us to a page where we can see what other users share our birthday.

Back to Top ↑

rgbCTF

rgbCTF: Too Slow

I’ve made this flag decryptor! It’s super secure, but it runs a little slow.

rgbCTF: icanhaz

can u haz a meaningful career in cybersecurity tool development? we hope so!

rgbCTF: Hallo?

The flag is exactly as decoded. No curly brackets.

Back to Top ↑

redpwnCTF

redpwnCTF: static-pastebin

I wanted to make a website to store bits of text, but I don’t have any experience with web development. However, I realized that I don’t need any! If you experience any issues, make a paste and send it here

Back to Top ↑

DefenitCTF

DefenitCTF: MoM’s Touch

We’re given a binary called momsTouch for this challenge. When we run this binary, we get the following message:

Back to Top ↑

PoseidonCTF

Back to Top ↑