Solves
| Challenge | Category | Value | Time |
|---|---|---|---|
| Get Out of My Swamp | OSINT | 10 | |
| Who's Debugging | Reverse Engineering | 15 | |
| Eicar | Malware | 5 | |
| Quiet Harvest | Malware | 10 | |
| Call of the WinAPI | Malware | 15 | |
| Autumn Leaves | Malware | 10 | |
| Redacted 2 | Steganography | 10 | |
| Funumbers | Cryptography | 5 | |
| Breaking RSA | Cryptography | 30 | |
| Ancient Ciphers | Cryptography | 5 | |
| Wordsearch_2 | Misc | 10 | |
| Out of Bounds | Misc | 10 | |
| Latin | Steganography | 10 | |
| Wordsearch_1 | Misc | 5 | |
| What's the code? | Misc | 5 | |
| Maze | Misc | 10 | |
| Headers Harvest 2-1 | Forensics | 10 | |
| Headers Harvest 2 | Misc | 5 | |
| Environment Sleuth | Windows | 5 | |
| Firewall Frenzy 1 | Networking | 5 | |
| Windows File Extensions | Steganography | 5 | |
| What Am I Looking at Here? | Steganography | 5 | |
| Gain Access | 0 |