NCS-Competition
nsa-codebreaker-2020
Our great sponsors
NCS-Competition | nsa-codebreaker-2020 | |
---|---|---|
1 | 4 | |
5 | 74 | |
- | - | |
0.0 | 0.0 | |
almost 3 years ago | almost 3 years ago | |
Python | Python | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
NCS-Competition
-
Help with Decompiling Binary file
The correct decompilation for the binary's main() function and the bm01.zip file that contains the binary executable itself can both be found here: https://github.com/HHousen/NCS-Competition/tree/master/Binary/BM01. (The correct decompilation is in the readme.)
nsa-codebreaker-2020
- luker983/nsa-codebreaker-2020 - solutions to the 2020 NSA Codebreaker Challenge
-
NSA Codebreaker - 2 Days Left
Here are my solutions. If you have any questions feel free to ask them on the Discussions page or pm me!
- NSA Codebreaker Challenge 2020 Solutions
What are some alternatives?
XFFF - CTF servers using socket() and No-sql
Ciphey - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
ofrak - OFRAK: unpack, modify, and repack binaries.
CTF-Writeups - A collection of write-ups and scripts from various CTFs I've participated in
xepor - Xepor, a web routing framework for reverse engineers and security researchers, brings the best of mitmproxy & Flask
tryhackme-writeups - Write-Ups for TryHackMe
Digital-Forensics-Guide - Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
hackthebox-writeups - Writeups for HacktheBox 'boot2root' machines
Crypton - Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
MemLabs - Educational, CTF-styled labs for individuals interested in Memory Forensics
write-ups