A 5-day long CTF, with a challenge of every category coming out every day. Challenges range from beginner to medium.
Forge your own SHA512 signature using a length extension attack to execute signed SQL queries and get the flag.
Meet me halfway
Double AES ECB encryption. Use a cryptographic trick to brute force 2 keys separately and decrypt the flag.
A memory dump that needs to be analyzed to find traces of a malware attack
A packet capture file with encrypted data, and reverse the assembly instructions to decrypt the data