|
|
Challenge | Write-up with special mention |
---|
Validation date | Challenge | Number of points |
---|---|---|
2019-10-20 19:17:37 |
Reverse Engineering Time to learn x86 ASM & gdb
|
2 |
2019-06-06 22:46:49 |
Cryptography Public key recovery
|
2 |
2019-06-06 22:28:31 |
Reverse Engineering Can you see through the star
|
2 |
2019-06-06 20:26:36 |
JavaScript Why not be more secure?
|
5 |
2019-06-06 20:24:06 |
JavaScript Valid key required
|
2 |
2019-06-06 19:30:00 |
SQL Injection Random Login Form
|
2 |
2019-06-06 00:14:23 |
JavaScript Most Secure Crypto Algo
|
2 |
2019-06-06 00:09:57 |
JavaScript Then obfuscation is more secure
|
1 |
2019-06-06 00:01:47 |
JavaScript Why not?
|
2 |
2019-06-05 22:19:56 |
JavaScript Hashing is more secure
|
1 |
2019-06-05 22:14:09 |
JavaScript Client side validation is bad!
|
1 |
2019-06-05 21:31:23 |
SQL Injection Most basic SQLi pattern.
|
1 |