Author: @hellopir2
Not achieving the promised exponential growth? Simply insider trade better.
nc challs.umdctf.io 30306Attachments: chal.py Dockerfile
Author: @hellopir2
Not achieving the promised exponential growth? Simply insider trade better.
nc challs.umdctf.io 30306Attachments: chal.py Dockerfile
| 772067074 | |
| 624868654 | |
| 304919652 | |
| 133731444 | |
| 557670514 | |
| 710167907 | |
| 767926259 | |
| 235676991 | |
| 576208221 | |
| 494054324 |
This new pesky mode of CBC makes decrypting too hard >:(
ncat --ssl peskycbc.atreides.b01lersc.tf 8443Attachments: pesky_cbc.py
In this writeup, I will share how I solved "Pycomment" from KalmarCTF 2025. It was one of the tougher pyjails this year and makes use of two really unique ideas.
Thanks for the challenge, @ChattyPlatinumCool 😛
Can you please help us comment our code? And please don't attack us.
Below are my writeups to the Cyber Jawara CTF that I played in last week.
| ___=int(__import__('sys').argv[1] | |
| );_=___*(___//___<<___//___+___// | |
| ___+___//___|___//___)//(___//___ | |
| <<___//___+___//___+___//+___+___ | |
| //___)+(___//___--___//___);__=(_ | |
| //_+_//_--_//_)*(_+_+_-~_);print( | |
| ((_//_<<_//_+_//_+_//_|_//_+_//_)**___<<(_+_-~_<<_//_+_//_))//(( | |
| ((((_//_<<__*_*_)//~-(_//_<<__*_)*(((_//_<<(_*_*__<<_//_))//((_//+_<< |
| // find solutions in the form: | |
| // lambda s:hash(s+'????')%3 | |
| #include <stdio.h> | |
| #define NUM 32 | |
| #define MIN 1 | |
| #define MAX 127 | |
| #define HBASE 1000003 |