Some challenges were hosted on our infrastructure. They are now available as Docker images which you can download and run on your own computer. If you want to solve the challenges in the same way as the participants of the CTF, you should treat these Docker instances as blackboxes and avoid peeking at the backend code.

NameCategoryDockerPts# solved
Book of Allies
Find a company at GHC!
Physical 5 102
CTF Briefing
Your mission, if you choose to accept it
Grace Hopper 5 96
Security is QRyptous
Treasure hunt
Grace Hopper 10 23
Stegasaurus
Reverse 10 74
🍎🍌🍍
🤔😱😭
Image processing 10 226
Bytes
You can use a lot of bytes.
Exploit requires Docker 50 148
Password checker
See if your password is secure! Or whether this portal is secure!
Web Security requires Docker 50 485
The General's Cat
Decrypt this ancient scientific article
Crypto 50 648
The Robot's Grandmother
Robots have grandparents too!
Forensics 50 572
Ciphercel
Crypto inside Google Sheets
Crypto 100 52
Little Doggy Tables
-- SELECT * FROM '\u\n\h\a\c\k\a\b\l\e'; --
Web Security requires Docker 100 198
Reading between the lines
Find the secret in the archive
Forensics 100 97
Sniffed Off the Wire
Sifting through the noise
Forensics 100 58
SSS
Sharing is caring.
Grace Hopper 100 3
Cyber Crossword
A unique crossword puzzle.
Crossword 500 34
Needle in the haystack
Somewhere in this blob is the flag.
Forensics 500 59
Perlfuscated
De-obfuscate some code.
Reverse requires Docker 500 34
The Turing Agent
A Small Gameboy CTF
Reverse 500 41
6yte
You only get 6 of them
Exploit requires Docker 1000 119
Floppy
x86 image
Reverse 1000 58
Seventeen
A programming language with 17 instructions.
Compiler 1000 48