Comprehensive solutions and methodologies for steganography, reverse engineering, cryptography, and web security challenges
Click on any challenge to view the complete solution
Your first challenge! Find the flag in JavaScript bundle
EOF{f0und_m3_f!nally}
Mandatory! Find flag in rulebook PDF (disqualification if not solved)
EOF{h3r3_w3_90_4941n}
PDF with hidden text after EOF marker
EOF{u_r_@_ch!ck3n}
Audio password, AES-encrypted ZIP, and ROT-20 cipher
EOF{4nd4n_w4_d1nw4v4w}
GitLab profile search and source code analysis
EOF{script_kiddie@eofool.com}
Morse code in audio + Vigenère cipher with "Für Elise" key
EOF{decrypted_text}
Multi-layered steganography with PNG, MP3 extraction, and Caesar cipher
EOF{b3war3_!t$_c0m!ng_f0r_u}
ELF binary analysis, custom encryption, and base64 decoding
EOF{not_a_foolish_person_ig}
Esoteric NGFYU language, base64 URLs, and brightness/contrast steganography
EOF{@stley}
68 nested ZIPs and 48 base64 layers - 116 total iterations!
EOF{its_a_damn_loop}
32-bit binary, PRNG-based encryption, and data array extraction
EOF{wh3r3_ar3_my_po1n+5}
Simple string extraction from WAV file
EOF{hidden_among_bananananananana}
Death Note themed: YouTube → Caesar cipher → Google Drive → strings
EOF{apples_apples_everywhere_raaaah}
Web recon, hidden resources, base64 URIs, and LSB steganography
EOF{F0und_!t}
binwalk, exiftool, zsteg, steghide, strings
Ghidra, IDA Pro, GDB, objdump, radare2
curl, Burp Suite, wget, DevTools
CyberChef, hashcat, john, openssl
Python, Bash, Ruby, Node.js
file, hexdump, xxd, dd, base64