|
Youve got mail 2!
|
Forensics |
55 |
|
|
Report Error
|
Web exploitation |
142 |
|
|
Disk Encryption
|
Cryptography |
58 |
|
|
Backup
|
Web exploitation |
127 |
|
|
Pepstein
|
Forensics |
50 |
|
|
Broken Invoice
|
Forensics |
50 |
|
|
alog
|
Forensics |
50 |
|
|
The Contract
|
Cryptography |
52 |
|
|
Fibonacci Caesar
|
Cryptography |
50 |
|
|
Binary Caesar
|
Cryptography |
50 |
|
|
Bootstrap Betrayal
|
Web exploitation |
50 |
|
|
PleaseNoCry
|
Web exploitation |
50 |
|
|
Existential loading bar
|
Web exploitation |
50 |
|
|
G-Server
|
Web exploitation |
50 |
|
|
Hasher: Trust the Hash (They Said)
|
Misc |
50 |
|
|
Call Me Maybe
|
Reverse Engineering |
50 |
|
|
Unbake the cake
|
Reverse Engineering |
50 |
|
|
WiFi Heist
|
Reverse Engineering |
50 |
|