signals
|
Rev |
500 |
|
Meeting Flag
|
Opsec |
50 |
|
Buried in the Sand
|
Reverse Engineering II |
50 |
|
Python RE 1 Easy rev
|
Reverse Engineering I |
75 |
|
Reverse Engineering I Meeting Flag
|
Reverse Engineering I |
50 |
|
Flag Generator
|
Reverse Engineering I |
300 |
|
3 - asm reader
|
x86_64 Assembly |
200 |
|
2 - asm leaver
|
x86_64 Assembly |
150 |
|
1 - asm adder
|
x86_64 Assembly |
100 |
|
Assembly Meeting Flag
|
x86_64 Assembly |
50 |
|
New Intern 2
|
Web I |
100 |
|
The Source of Your Problems
|
Web I |
50 |
|
XSS 3
|
Web II |
300 |
|
Course Explorer
|
Web II |
300 |
|
UIUC 1 - SSN
|
Web II |
250 |
|
Diophantine Basics
|
Rev |
100 |
|
Deprecated - Specific stack overflow
|
Pwn |
150 |
|
Format String Quiz
|
PWN II (Format) |
100 |
|
Format 0
|
Pwn |
50 |
|
Easy Numbers
|
Crypto II |
250 |
|
Safe Cracking
|
Crypto II |
200 |
|
Add One
|
Block/Stream Ciphers |
200 |
|
Seal Trouble II
|
Crypto |
200 |
|
Not Rough
|
Crypto |
400 |
|
Format 1
|
Pwn |
250 |
|
Integer Overflow
|
PWN I |
150 |
|
Hashcat 2
|
Password Cracking |
250 |
|
A Very Special Character 2
|
Intro to Terminal and Setup |
30 |
|
dialogue speed
|
Reverse Engineering I |
300 |
|
ssrf 1
|
Web III |
100 |
|
RSA
|
Crypto II |
150 |
|
1 - Manipulate
|
Pwn |
150 |
|
Deprecated - stack overflow
|
Pwn |
100 |
|
0 - Overflow
|
Pwn |
100 |
|
Word Counter II
|
Web |
75 |
|
Word Counter I
|
Web III |
75 |
|
Password Cracking
|
Password Cracking |
150 |
|
Odd One Out
|
Crypto |
200 |
|
Easy RSA
|
Crypto I |
200 |
|
Totient Turmoil
|
Crypto I |
150 |
|
Seal Trouble I
|
Crypto |
150 |
|
First AES
|
Block/Stream Ciphers |
100 |
|
Java Reversing 2
|
Java Reverse Engineering |
250 |
|
Java Reversing 1.5
|
Java Reverse Engineering |
200 |
|
Java Reversing 1
|
Java Reverse Engineering |
100 |
|
openme!
|
Forensics I |
20 |
|
Matryoshka
|
Forensics I |
200 |
|
Crack PDF
|
Password Cracking |
150 |
|
Bruh 1: lsbruh
|
Forensics I |
100 |
|
Natas 20
|
Shell |
50 |
|
Natas 19
|
Shell |
50 |
|
Natas 18
|
Shell |
50 |
|
Natas 17
|
Shell |
50 |
|
Natas 16
|
Shell |
50 |
|
Natas 15
|
Shell |
50 |
|
Natas 14
|
Shell |
50 |
|
Natas 13
|
Shell |
50 |
|
Natas 12
|
Shell |
50 |
|
Natas 11
|
Shell |
20 |
|
Natas 10
|
Shell |
20 |
|
Natas 9
|
Shell |
20 |
|
Natas 8
|
Shell |
20 |
|
Natas 7
|
Shell |
20 |
|
Natas 6
|
Shell |
20 |
|
Natas 5
|
Shell |
20 |
|
Natas 4
|
Shell |
20 |
|
Natas 3
|
Shell |
20 |
|
Natas 2
|
Shell |
20 |
|
Natas 1
|
Shell |
20 |
|
Natas 0
|
Shell |
20 |
|
rot13
|
Rev |
100 |
|
toobeetootee
|
Networking Security |
800 |
|
The Chars Are Friends
|
Crypto |
200 |
|
Vigenère Visionary
|
Crypto I |
100 |
|
PAD PAD PAD
|
Crypto I |
350 |
|
More Hash More Better
|
Crypto |
100 |
|
Find Spoingus 4
|
OSINT I |
100 |
|
Find Spoingus 3
|
OSINT I |
100 |
|
Find Spoingus 2
|
OSINT I |
100 |
|
Find Spoingus 1
|
OSINT I |
100 |
|
Layer 4
|
Networking Security |
50 |
|
Layer 1
|
Networking Security |
30 |
|
Baby Wireshark Doo Doo Doo
|
Networking Security |
100 |
|
Layer 3
|
Networking Security |
50 |
|
Layer 2
|
Networking Security |
30 |
|
Layer 7
|
Networking Security |
75 |
|
Layer 6
|
Networking Security |
75 |
|
File Transfer
|
Networking Security |
50 |
|
Inside the Hackerman
|
Forensics I |
50 |
|
Partition
|
Forensics I |
50 |
|
Solve A Machine
|
Misc |
500 |
|
angry
|
Rev |
500 |
|
Diffie-Hellman God
|
Crypto I |
250 |
|
SQL Injection 2
|
Web II |
250 |
|
SQL Injection 1
|
Web II |
100 |
|
irreversible
|
Rev |
400 |
|
encryption
|
Rev |
200 |
|
Calculator Escape 2
|
Jail |
125 |
|
Calculator Escape 1
|
Jail |
50 |
|
Calculator Escape 0
|
Jail |
25 |
|
Pyjail 5
|
Python Jails |
300 |
|
Pyjail 4
|
Python Jails |
250 |
|
Pyjail 3
|
Python Jails |
200 |
|
Pyjail 2
|
Python Jails |
200 |
|
Pyjail 1
|
Python Jails |
150 |
|
Pyjail 0.5
|
Python Jails |
30 |
|
Pyjail 0
|
Python Jails |
20 |
|
Meeting Flag
|
Python Jails |
50 |
|
Deprecated - ret2shellcode
|
Pwn |
300 |
|
Deprecated - ret2win
|
Pwn |
200 |
|
Bruh 0: Exif
|
Forensics I |
50 |
|
Image
|
Forensics I |
25 |
|
Just Another Logo
|
Forensics I |
20 |
|
Meeting Flag
|
Esoteric Languages |
50 |
|
Elgamal Oracle
|
Crypto |
350 |
|
Merkle
|
Crypto |
250 |
|
flag_format
|
Crypto I |
100 |
|
First XOR
|
Crypto I |
50 |
|
Crypto I Meeting Flag
|
Crypto I |
50 |
|
Meeting Flag
|
PWN I |
50 |
|
Pentesting I Meeting Flag
|
Pentesting |
50 |
|
Meeting Flag
|
Supply Chain Attacks & Policy |
50 |
|
AI Hacking Meeting Flag
|
AI Hacking |
50 |
|
Meeting Flag
|
Physical Security |
50 |
|
XSS 2
|
Web II |
200 |
|
XSS 1
|
Web II |
100 |
|
Web II Meeting Flag
|
Web II |
50 |
|
Setup Meeting Flag
|
Intro to Terminal and Setup |
50 |
|
Meeting Flag
|
Ethics and Law |
50 |
|
Rev II Meeting Flag
|
Rev II |
50 |
|
Rev I Meeting Flag
|
Rev I |
50 |
|
first_re
|
Rev |
100 |
|
Rev Setup Meeting Flag
|
Rev Setup |
50 |
|
Meeting Flag
|
Antivirus & EDR Evasion |
50 |
|
Meeting Flag
|
Cloudsec |
50 |
|
Decision Day 3
|
Web I |
25 |
|
Path To Success
|
Web I |
50 |
|
Inspect Me 5
|
Web I |
50 |
|
Inspect Me 8
|
Web I |
50 |
|
Inspect Me 4
|
Web I |
50 |
|
Inspect Me 2
|
Web I |
50 |
|
Inspect Me 7
|
Web I |
50 |
|
Inspect Me 6
|
Web I |
50 |
|
Inspect Me 3
|
Web I |
50 |
|
Inspect Me 1
|
Web I |
50 |
|
New Intern 1
|
Web I |
25 |
|
Decision Day 4
|
Web I |
25 |
|
Decision Day 2
|
Web I |
25 |
|
Decision Day 1
|
Web I |
25 |
|
Web I Meeting Flag
|
Web I |
50 |
|
VIM Quiz
|
Misc |
100 |
|
Language Identification
|
Esoteric Languages |
50 |
|
Hashcat 1
|
Password Cracking |
50 |
|
Anakin's PC
|
Password Cracking |
50 |
|
Generate MD5 Hash
|
Password Cracking |
25 |
|
bandit20
|
Shell |
20 |
|
bandit19
|
Shell |
20 |
|
bandit18
|
Shell |
20 |
|
bandit17
|
Shell |
20 |
|
bandit16
|
Shell |
20 |
|
bandit15
|
Shell |
20 |
|
bandit14
|
Shell |
20 |
|
bandit13
|
Shell |
20 |
|
bandit12
|
Intro to Terminal and Setup |
20 |
|
bandit11
|
Intro to Terminal and Setup |
20 |
|
bandit10
|
Intro to Terminal and Setup |
20 |
|
bandit09
|
Intro to Terminal and Setup |
20 |
|
bandit08
|
Intro to Terminal and Setup |
20 |
|
bandit07
|
Intro to Terminal and Setup |
20 |
|
bandit06
|
Intro to Terminal and Setup |
20 |
|
bandit05
|
Intro to Terminal and Setup |
20 |
|
bandit04
|
Intro to Terminal and Setup |
20 |
|
bandit03
|
Intro to Terminal and Setup |
20 |
|
bandit02
|
Intro to Terminal and Setup |
20 |
|
bandit01
|
Intro to Terminal and Setup |
20 |
|
bandit00
|
Intro to Terminal and Setup |
20 |
|
Shell Basics 6 - Environment Variables
|
Intro to Terminal and Setup |
20 |
|
Shell Basics 5.3 - File To stdin
|
Intro to Terminal and Setup |
20 |
|
Shell Basics 5.2 - Pipe Output From Script
|
Intro to Terminal and Setup |
20 |
|
Shell Basics 5.1 - Pipe Output
|
Intro to Terminal and Setup |
20 |
|
Shell Basics 4 - Hidden Files
|
Intro to Terminal and Setup |
20 |
|
Shell Basics 3 - Terminate
|
Intro to Terminal and Setup |
20 |
|
Shell Basics 2 - Read Files
|
Intro to Terminal and Setup |
20 |
|
Shell Basics 1 - Tab Completion
|
Intro to Terminal and Setup |
20 |
|
the-library-5
|
Intro to Terminal and Setup |
50 |
|
the-library-4
|
Intro to Terminal and Setup |
50 |
|
the-library-3
|
Intro to Terminal and Setup |
50 |
|
the-library-2
|
Intro to Terminal and Setup |
50 |
|
the-library-1
|
Intro to Terminal and Setup |
50 |
|
netcat
|
Intro to Terminal and Setup |
20 |
|
Shell Basics 0
|
Intro to Terminal and Setup |
20 |
|
A Very Special Character
|
Intro to Terminal and Setup |
20 |
|
Welcome to SIGPwny!
|
Welcome |
50 |
|
SIGPwny Discord
|
Welcome |
50 |
|