2 years agoExploiting a Vulnerable Linked List Implementation - "Links 1" Pwn Challenge [ImaginaryCTF]CryptoCat
2 years agoIntergalactic Recovery [easy]: HackTheBox Forensics Challenge (RAID 5 Disk Recovery)CryptoCat
1 year agoLeaking Secret Data with a Heap Overflow - "Leek" Pwn Challenge [Angstrom CTF 2023]CryptoCat