Switch to lite version Switch to dark theme

About Kyrah

UsernameKyrah
CountryFrance
Member since2014-05-07
Coins0
Points234
Write-up with special mention0
Ranking256 / 49142
Challenges completed88 / 391

Challenge Write-up with special mention
Validation date Challenge Number of points
2015-12-06 12:09:34
Steganography
Look inside the house
2
2015-12-06 12:02:36
Steganography
You're lost? Use the map
1
2015-11-17 16:16:58
SysAdmin Linux
SysAdmin Part 3
1
2015-11-17 15:59:00
SysAdmin Linux
SysAdmin Part 8
4
2015-11-17 15:20:48
SysAdmin Linux
SysAdmin Part 2
1
2015-11-16 16:05:38
SysAdmin Linux
SysAdmin Part 4
2
2015-11-15 13:01:08
Malware Analysis
Capture 1 Part 3
1
2015-11-15 12:52:03
Malware Analysis
Capture 1 Part 6
3
2015-11-15 11:19:10
Malware Analysis
Capture 1 Part 1
1
2014-07-31 17:46:52
Web
Password reset reloaded
3
2014-07-31 17:28:49
Web
Facebook will never forget this one
3
2014-07-31 13:35:17
Shellcoding
Linux x64 shellcoding level 2
4
2014-07-31 13:32:39
Shellcoding
Basics of Linux x64 shellcoding
2
2014-07-28 16:59:53
Forensics
Really Depressed Protocol
7
2014-07-28 07:12:16
Web
Password reset
2
2014-07-27 13:06:11
Steganography
Brainsick
2
2014-07-27 11:19:14
Reverse Engineering
Wrong byte!
4
2014-07-20 03:18:59
Reverse Engineering
Kernel introduction
3
2014-07-18 17:38:30
JavaScript
Why not be more secure?
5
2014-07-18 15:11:01
Steganography
Walk the line!
5
2014-07-18 12:21:01
JavaScript
Valid key required
2
2014-07-18 11:53:47
JavaScript
Most Secure Crypto Algo
2
2014-07-18 10:20:21
Steganography
Can you see through the matrix!
3
2014-07-17 17:14:32
Web
Malicious upload
2
2014-07-16 16:29:33
Forensics
The words flew but writing remains
3
2014-07-15 14:20:14
Cryptography
Encrypted Zip
4
2014-07-15 13:51:51
Forensics
Poor internet connection
4
2014-07-14 15:04:04
Cryptography
Crypto over the network
4
2014-07-14 12:52:12
Cryptography
Hangovers and more: Bacon
3
2014-07-14 08:58:30
Coding Challenges
Ascii Art
6
2014-07-14 08:16:10
Reverse Engineering
Introduction to MIPS
3
2014-05-24 17:46:37
SQL Injection
Login portal 2
3
2014-05-22 15:51:55
Steganography
Your old friend Orloge Simard
3
2014-05-20 16:02:35
Jail Escaping
PyJail 2
5
2014-05-20 15:24:01
Jail Escaping
PyJail 1
3
2014-05-15 12:52:09
SysAdmin Linux
SysAdmin Part 6
3
2014-05-14 14:38:23
SysAdmin Linux
SysAdmin Part 1
1
2014-05-13 15:53:05
Reverse Engineering
Windows API for the win
4
2014-05-13 14:33:49
Reverse Engineering
Crack Me 1
3
2014-05-13 12:36:50
Steganography
Victor reloaded
2
2014-05-12 16:35:31
Reverse Engineering
Introduction to ARM
4
2014-05-12 16:02:53
Steganography
A ghost sound
2
2014-05-12 14:19:23
Pwnage Linux
Level2 Pwnage Linux Level Up
2
2014-05-12 13:05:19
Pwnage Linux
Level1 Pwnage Linux Level Up
1
2014-05-12 10:25:55
SQL Injection
Thinking outside the box is the key
4
2014-05-12 09:40:45
SQL Injection
Login portal 1
2
2014-05-11 18:01:07
SQL Injection
What's the definition of NULL
3
2014-05-11 17:37:46
SQL Injection
Quote of the day
4
2014-05-11 17:26:15
SQL Injection
Po po po po postgresql
2
2014-05-11 14:20:26
SQL Injection
ACL rulezzz the world.
2
2014-05-11 14:09:56
Reverse Engineering
I never forget the Nintendo 64
3
2014-05-11 14:04:31
Reverse Engineering
Can you see through the star
2
2014-05-11 12:30:36
Forensics
2 / 3 Did you see my desktop?
3
2014-05-11 11:50:59
Forensics
3 / 3 Suspicious account password?
4
2014-05-11 11:47:29
Forensics
1 / 3 Do not waste the environment
2
2014-05-11 10:33:52
Reverse Engineering
Windows x86 reversing is cool
3
2014-05-11 09:53:24
JavaScript
Why not?
2
2014-05-11 09:37:20
JavaScript
Then obfuscation is more secure
1
2014-05-11 09:19:42
Web
Looking for password file
1
2014-05-11 09:02:03
Web
Security thru obscurity!
2
2014-05-11 05:33:08
Forensics
Hey Chuck where is the flag?
2
2014-05-11 05:21:18
Forensics
Attention Dinosaure Survive
2
2014-05-10 19:15:06
Web
Serial killer!
3
2014-05-10 18:18:42
Cryptography
I Lost my password
3
2014-05-10 16:29:53
Cryptography
Public key recovery
2
2014-05-10 16:26:28
Cryptography
File recovery
1
2014-05-10 16:21:21
Reverse Engineering
Time to learn x86 ASM & gdb
2
2014-05-10 16:12:40
Coding Challenges
Read me if you can
6
2014-05-10 15:54:59
Coding Challenges
Xor me if you can
6
2014-05-10 13:18:32
Coding Challenges
I saw a little elf
4
2014-05-10 12:20:02
Coding Challenges
Hash breaker reloaded
5
2014-05-10 12:00:27
Coding Challenges
Hash breaker
4
2014-05-10 11:40:38
Coding Challenges
I hate mathematics
3
2014-05-10 11:32:42
Coding Challenges
Hash me reloaded
3
2014-05-10 11:17:15
Coding Challenges
Hash me please
2
2014-05-07 18:29:29
Cryptography
Martian message part 2
2
2014-05-07 18:24:37
Cryptography
Some martian message
1
2014-05-07 18:18:04
Forensics
Hide my ass in my home!
2
2014-05-07 18:14:07
Forensics
Dr. Pouce
2
2014-05-07 18:06:54
Forensics
I made a dd of Agent Smith usb key
1
2014-05-07 17:42:14
Web
Looking for the flag?
3
2014-05-07 17:26:15
JavaScript
Hashing is more secure
1
2014-05-07 17:25:31
JavaScript
Client side validation is bad!
1
2014-05-07 17:05:20
Steganography
Victor you're hidding me something
1
2014-05-07 17:01:25
Web
Words mean something?
1
2014-05-07 16:54:54
Web
Headache
1
2014-05-07 16:51:21
Web
Area 51
1
2014-05-07 16:38:07
SQL Injection
Most basic SQLi pattern.
1
top