Solves
| Utmaning | Kategori | Värde | Tid |
|---|---|---|---|
| UUID Guesser | Misc | 390 | |
| Windows Forensics Hell | Forensics | 413 | |
| Relay Chat | Misc | 471 | |
| GoodVM | Binary | 342 | |
| Squeaky Clean 1 | Boot 2 Root | 367 | |
| Speedrun | Cryptography | 197 | |
| Stackless | Reverse Engineering | 291 | |
| Hook Relay Revenge | Web exploitation | 367 | |
| Reactor | Reverse Engineering | 177 | |
| Hook Relay | Web exploitation | 291 | |
| Report Error | Web exploitation | 142 | |
| Youve got mail! | Forensics | 103 | |
| Backup | Web exploitation | 127 | |
| Mitosis | Reverse Engineering | 103 | |
| Youve got mail 2! | Forensics | 55 | |
| Peaceful | Forensics | 103 | |
| I have lost my package | Misc | 85 | |
| kopi pasta | Boot 2 Root | 103 | |
| G-Server | Web exploitation | 50 | |
| Persistance is Key | Forensics | 62 | |
| Bootstrap Betrayal | Web exploitation | 50 | |
| The Contract | Cryptography | 52 | |
| fear of long words | Binary | 50 | |
| Disk Encryption | Cryptography | 58 | |
| PleaseNoCry | Web exploitation | 50 | |
| Existential loading bar | Web exploitation | 50 | |
| Hasher: Trust the Hash (They Said) | Misc | 50 | |
| Broken Invoice | Forensics | 50 | |
| Call Me Maybe | Reverse Engineering | 50 | |
| alog | Forensics | 50 | |
| Fibonacci Caesar | Cryptography | 50 | |
| Unbake the cake | Reverse Engineering | 50 | |
| WiFi Heist | Reverse Engineering | 50 | |
| Binary Caesar | Cryptography | 50 | |
| Pepstein | Forensics | 50 |