Reject modern web frameworks! Let's go back to the era of CGI scripts.
https://imaginaryctf.org/f/GNB82#chall.tar.gz http://ictf2.maple3142.net:8763/
I've heard it's good to have clear and helpful error messages for your users, so they know what the issue is.
http://puzzler7.imaginaryctf.org:11005
Find the bonus jctf{} flag in Helpful and DM it to @puzzler7#1337 to get the @Envy of the World role!
jctf{}
Just a little web app I made to play with some web things. Have fun!
http://puzzler7.imaginaryctf.org:11002
I've heard so much about SQL injection, so I've made sure to use parameterized queries here!
http://puzzler7.imaginaryctf.org:11000/
Had a friend redact this flag - can you recover it?
https://imaginaryctf.org/f/BP8VS#redacted.png
Wireshark is fun!
https://imaginaryctf.org/f/iTzDw
As we all know, finding a root for a polynomial modulo n requires knowing the factorization of n, so it should be as safe as RSA!
https://imaginaryctf.org/f/uyKqz#chall.sage https://imaginaryctf.org/f/J2402#output.txt
It's a tradition at this point.
https://imaginaryctf.org/f/zNVLc#seedsar.py
Let the comments commence!
https://imaginaryctf.org/f/6siGC#server.py nc puzzler7.imaginaryctf.org 11004
nc puzzler7.imaginaryctf.org 11004
I've had you generating regrets to match strings before, but never the other way around - let's see how this goes.
nc puzzler7.imaginaryctf.org 11003 https://imaginaryctf.org/f/oqui5#xeger1.py
nc puzzler7.imaginaryctf.org 11003
Welcome to round 32!
ictf{w3lcom3_to_r0und_32!}
Ya feelin' lucky, punk?
nc puzzler7.imaginaryctf.org 11001 https://imaginaryctf.org/f/xTbaF#lucky
nc puzzler7.imaginaryctf.org 11001
This is the same challenge as last month, except no helper function to jump to. So there's less code. Simpler.
nc simplebufferoverflow.fly.dev 5000 https://imaginaryctf.org/f/AbS2Q
I love me a good reversive algorithm.
https://imaginaryctf.org/f/qExOj#reversive.py