Dataset Viewer
Auto-converted to Parquet
id
int64
3
425
name
stringlengths
2
32
answer
stringlengths
1
63
question
stringlengths
10
603
hints
listlengths
0
6
files
listlengths
0
4
category
stringclasses
6 values
difficulty
stringclasses
3 values
240
fixme1.py
1nd3nt1ty_cr1515_09ee727a
Fix the syntax error in the Python script to print the flag.
[ "Indentation is very meaningful in Python", "To view the file in the webshell, do: $ nano fixme1.py", "To exit nano, press Ctrl and x and follow the on-screen prompts.", "The str_xor function does not need to be reverse engineered for this challenge." ]
[ "https://artifacts.picoctf.net/c/26/fixme1.py" ]
General Skills
Easy
241
fixme2.py
3qu4l1ty_n0t_4551gnm3nt_4863e11b
Fix the syntax error in the Python script to print the flag.
[ "Are equality and assignment the same symbol?", "To view the file in the webshell, do: $ nano fixme2.py", "To exit nano, press Ctrl and x and follow the on-screen prompts.", "The str_xor function does not need to be reverse engineered for this challenge." ]
[ "https://artifacts.picoctf.net/c/5/fixme2.py" ]
General Skills
Easy
144
Mod 26
next_time_I'll_try_2_rounds_of_rot13_Aphnytiq
Cryptography can be easy, do you know what ROT13 is? cvpbPGS{arkg_gvzr_V'yy_gel_2_ebhaqf_bs_ebg13_Ncualgvd}
[ "This can be solved online if you don't want to do it by hand!" ]
[]
Cryptography
Easy
373
rotation
r0tat1on_d3crypt3d_555957f3
You will find the flag after decrypting this file.
[ "Sometimes rotation is right" ]
[ "https://artifacts.picoctf.net/c/385/encrypted.txt" ]
Cryptography
Medium
418
interencdec
caesar_d3cr9pt3d_b204adc6
Can you get the real meaning from this file.
[ "Engaging in various decoding processes is of utmost importance" ]
[ "https://artifacts.picoctf.net/c_titan/3/enc_flag" ]
Cryptography
Easy
367
ReadMyCert
read_mycert_41d1c74c
How about we take you on an adventure on exploring certificate signing requests
[ "Download the certificate signing request and try to read it." ]
[ "https://artifacts.picoctf.net/c/426/readmycert.csr" ]
Cryptography
Medium
287
patchme.py
p47ch1ng_l1f3_h4ck_f01eabfa
Can you get the flag? Run this Python program in the same directory as this encrypted flag.
[]
[ "https://artifacts.picoctf.net/c/201/patchme.flag.py", "https://artifacts.picoctf.net/c/201/flag.txt.enc" ]
Reverse Engineering
Medium
294
Safe Opener
pl3as3_l3t_m3_1nt0_th3_saf3
Can you open this safe? I forgot the key to my safe but this program is supposed to help me with retrieving the lost key. Can you help me unlock my safe? Put the password you recover into the picoCTF flag format like: picoCTF{password}
[]
[ "https://artifacts.picoctf.net/c/83/SafeOpener.java" ]
Reverse Engineering
Medium
423
Secret of the Polyglot
f1u3n7_1n_pn9_&_pdf_2a6a1ea8
The Network Operations Center (NOC) of your local institution picked up a suspicious file, they're getting conflicting information on what type of file it is. They've brought you in as an external expert to examine the file. Can you extract all the information from this strange file?
[ "This problem can be solved by just opening the file in different ways" ]
[ "https://artifacts.picoctf.net/c_titan/99/flag2of2-final.pdf" ]
Forensics
Easy
420
Mob psycho
ax8mC0RU6ve_NX85l4ax8mCl_52a5e2de
Can you handle APKs?
[ "Did you know you can unzip APK files?", "Now you have the whole host of shell tools for searching these files." ]
[ "https://artifacts.picoctf.net/c_titan/51/mobpsycho.apk" ]
Forensics
Medium
290
Redaction gone wrong
C4n_Y0u_S33_m3_fully
Now you DON'T see me. This report has some critical data in it, some of which have been redacted correctly, while some were not. Can you find an important key that was not redacted properly?
[ "How can you be sure of the redaction?" ]
[ "https://artifacts.picoctf.net/c/84/Financial_Report_for_ABC_Labs.pdf" ]
Forensics
Medium
407
C3
adlibs
This is the Custom Cyclical Cipher! Enclose the flag in our wrapper for submission. If the flag was "example" you would submit "picoCTF{example}".
[ "Modern crypto schemes don't depend on the encoder to be secret, but this one does." ]
[ "https://artifacts.picoctf.net/c_titan/47/ciphertext", "https://artifacts.picoctf.net/c_titan/47/convert.py" ]
Cryptography
Medium
248
PW Crack 4
fl45h_5pr1ng1ng_d770d48c
Can you crack the password to get the flag? Download the password checker here and you'll need the encrypted flag and the hash in the same directory too. There are 100 potential passwords with only 1 being correct. You can find these by examining the password checker script.
[ "A for loop can help you do many things very quickly.", "The str_xor function does not need to be reverse engineered for this challenge." ]
[ "https://artifacts.picoctf.net/c/21/level4.py", "https://artifacts.picoctf.net/c/21/level4.flag.txt.enc", "https://artifacts.picoctf.net/c/21/level4.hash.bin" ]
General Skills
Medium
408
CanYouSee
ME74D47A_HIDD3N_4dabddcb
How about some hide and seek?
[ "How can you view the information about the picture?", "If something isn't in the expected form, maybe it deserves attention?" ]
[ "https://artifacts.picoctf.net/c_titan/5/unknown.zip" ]
Forensics
Easy
279
Lookey here
gr3p_15_@w3s0m3_2116b979
Attackers have hidden information in a very large mass of data in the past, maybe they are still doing it.
[ "Download the file and search for the flag based on the known prefix." ]
[ "https://artifacts.picoctf.net/c/126/anthem.flag.txt" ]
Forensics
Medium
425
Time Machine
t1m3m@ch1n3_5cde9075
What was I last working on? I remember writing a note to help me remember...
[ "The cat command will let you read a file, but that won't help you here!", "Read the chapter on Git from the picoPrimer here. (https://primer.picoctf.org/#_git_version_control)", "When committing a file with git, a message can (and should) be included." ]
[ "https://artifacts.picoctf.net/c_titan/67/challenge.zip" ]
General Skills
Easy
410
Collaborative Development
t3@mw0rk_m@k3s_th3_dr3@m_w0rk_4c24302f
My team has been working very hard on new features for our flag printing program! I wonder how they'll work together?
[ "git branch -a will let you see available branches", "How can file 'diffs' be brought to the main branch? Don't forget to git config!", "Merge conflicts can be tricky! Try a text editor like nano, emacs, or vim." ]
[ "https://artifacts.picoctf.net/c_titan/71/challenge.zip" ]
General Skills
Easy
411
Commitment Issues
s@n1t1z3_cf09a485
I accidentally wrote the flag down. Good thing I deleted it!
[ "Version control can help you recover files if you change or lose them!", "Read the chapter on Git from the picoPrimer here (https://primer.picoctf.org/#_git_version_control)", "You can 'checkout' commits to see the files inside them" ]
[ "https://artifacts.picoctf.net/c_titan/137/challenge.zip" ]
General Skills
Easy
371
repetitions
base64_n3st3d_dic0d!n8_d0wnl04d3d_492767d2
Can you make sense of this file?
[ "Multiple decoding is always good." ]
[ "https://artifacts.picoctf.net/c/475/enc_flag" ]
General Skills
Easy
322
Big Zip
gr3p_15_m4g1c_ef8790dc
Unzip this archive and find the flag.
[ "Can grep be instructed to look at every file in a directory and its subdirectories?" ]
[ "https://artifacts.picoctf.net/c/503/big-zip-files.zip" ]
General Skills
Easy
320
First Find
f1nd_15_f457_ab443fd1
Unzip this archive and find the file named 'uber-secret.txt'
[]
[ "https://artifacts.picoctf.net/c/500/files.zip" ]
General Skills
Easy
250
runme.py
run_s4n1ty_run
Run the runme.py script to get the flag. Download the script with your browser or with wget in the webshell.
[ "If you have Python on your computer, you can download the script normally and run it. Otherwise, use the wget command in the webshell.", "To use wget in the webshell, first right click on the download link and select 'Copy Link' or 'Copy Link Address'", "Type everything after the dollar sign in the webshell: $ wget , then paste the link after the space after wget and press enter. This will download the script for you in the webshell so you can run it!", "Finally, to run the script, type everything after the dollar sign and then press enter: $ python3 runme.py You should have the flag now!" ]
[ "https://artifacts.picoctf.net/c/34/runme.py" ]
General Skills
Easy
4
where are the robots
ca1cu1at1ng_Mach1n3s_8028f
Can you find the robots? https://jupiter.challenges.picoctf.org/problem/60915/ or http://jupiter.challenges.picoctf.org:60915
[ "What part of the website could tell you where the creator doesn't want you to look?" ]
[]
Web Exploitation
Easy
7
vault-door-training
w4rm1ng_Up_w1tH_jAv4_be8d9806f18
Your mission is to enter Dr. Evil's laboratory and retrieve the blueprints for his Doomsday Project. The laboratory is protected by a series of locked vault doors. Each door is controlled by a computer and requires a password to open. Unfortunately, our undercover agents have not been able to obtain the secret passwords for the vault doors, but one of our junior agents obtained the source code for each vault's computer! You will need to read the source code for each level to figure out what the password is for that vault door. As a warmup, we have created a replica vault in our training facility.
[ "The password is revealed in the program's source code." ]
[ "https://jupiter.challenges.picoctf.org/static/a4a1ca9c54d8fac9404f9cbc50d9751a/VaultDoorTraining.java" ]
Reverse Engineering
Easy
12
vault-door-1
d35cr4mbl3_tH3_cH4r4cT3r5_75092e
This vault uses some complicated arrays! I hope you can make sense of it, special agent.
[ "Look up the charAt() method online." ]
[ "https://jupiter.challenges.picoctf.org/static/ff2585f7afd21b81f69d2fbe37c081ae/VaultDoor1.java" ]
Reverse Engineering
Easy
19
So Meta
s0_m3ta_eb36bf44
Find the flag in this picture.
[ "What does meta mean in the context of files?", "Ever heard of metadata?" ]
[ "https://jupiter.challenges.picoctf.org/static/89b371a46702a31aa9931a2a2b12f8bf/pico_img.png" ]
Forensics
Medium
37
strings it
5tRIng5_1T_d66c7bb7
Can you find the flag in file without running it?
[ "strings (https://linux.die.net/man/1/strings)" ]
[ "https://jupiter.challenges.picoctf.org/static/94d00153b0057d37da225ee79a846c62/strings" ]
General Skills
Easy
43
Easy1
CRYPTOISFUN
The one time pad can be cryptographically secure, but not when you know the key. Can you solve this? We've given you the encrypted flag, key, and a table to help UFJKXQZQUNB with the key of SOLVECRYPTO. Can you use this table to solve it?
[ "Submit your answer in our flag format. For example, if your answer was 'hello', you would submit 'picoCTF{HELLO}' as the flag.", "Please use all caps for the message." ]
[ "https://jupiter.challenges.picoctf.org/static/1fd21547c154c678d2dab145c29f1d79/table.txt" ]
Cryptography
Medium
44
Glory of the Garden
more_than_m33ts_the_3y3eBdBd2cc
This garden contains more than it seems.
[ "What is a hex editor?" ]
[ "https://jupiter.challenges.picoctf.org/static/d0e1ffb10fc0017c6a82c57900f3ffe3/garden.jpg" ]
Forensics
Easy
64
caesar
crossingtherubiconvfhsjkou
Decrypt this message.
[ "caesar cipher tutorial (https://learncryptography.com/classical-encryption/caesar-cipher)" ]
[ "https://jupiter.challenges.picoctf.org/static/49f31c8f17817dc2d367428c9e5ab0bc/ciphertext" ]
Cryptography
Medium
66
dont-use-client-side
no_clients_plz_7723ce
Can you break into this super secure portal? https://jupiter.challenges.picoctf.org/problem/29835/ or http://jupiter.challenges.picoctf.org:29835
[ "Never trust the client" ]
[]
Web Exploitation
Easy
85
First Grep
grep_is_good_to_find_things_f77e0797
Can you find the flag in file? This would be really tedious to look through manually, something tells me there is a better way.
[ "grep tutorial (https://ryanstutorials.net/linuxtutorial/grep.php)" ]
[ "https://jupiter.challenges.picoctf.org/static/315d3325dc668ab7f1af9194f2de7e7a/file" ]
General Skills
Easy
110
Wireshark twoo twooo two twoo...
dns_3xf1l_ftw_deadbeef
Can you find the flag? shark2.pcapng.
[ "Did you really find _the_ flag?", "Look for traffic that seems suspicious." ]
[ "https://mercury.picoctf.net/static/7b8e53329b34946177a9b5f2860a0292/shark2.pcapng" ]
Forensics
Medium
421
packer
U9X_UnP4ck1N6_B1n4Ri3S_5dee4441
Reverse this linux executable?
[ "What can we do to reduce the size of a binary after compiling it." ]
[ "https://artifacts.picoctf.net/c_titan/22/out" ]
Reverse Engineering
Medium
113
Disk, disk, sleuth!
f0r3ns1c4t0r_n30phyt3_a6f4cab5
Use `srch_strings` from the sleuthkit and some terminal-fu to find a flag in this disk image: dds1-alpine.flag.img.gz
[ "Have you ever used `file` to determine what a file was?", "Relevant terminal-fu in picoGym: https://play.picoctf.org/practice/challenge/85", "Mastering this terminal-fu would enable you to find the flag in a single command: https://play.picoctf.org/practice/challenge/48", "Using your own computer, you could use qemu to boot from this disk!" ]
[ "https://mercury.picoctf.net/static/626ea9c275fbd02dd3451b81f9c5e249/dds1-alpine.flag.img.gz" ]
Forensics
Medium
115
Wireshark doo dooo do doo...
p33kab00_1_s33_u_deadbeef
Can you find the flag? shark1.pcapng.
[]
[ "https://mercury.picoctf.net/static/81c7862241faf4a48bd64a858392c92b/shark1.pcapng" ]
Forensics
Medium
121
keygenme-py
1n_7h3_|<3y_of_ac73dc29
keygenme-trial.py
[]
[ "https://mercury.picoctf.net/static/9055e7d35f5f4646338a1734aea0dda5/keygenme-trial.py" ]
Reverse Engineering
Medium
124
More Cookies
cO0ki3s_yum_e40d16a9
I forgot Cookies can Be modified Client-side, so now I decided to encrypt them! http://mercury.picoctf.net:34962/
[ "https://en.wikipedia.org/wiki/Homomorphic_encryption", "The search endpoint is only helpful for telling you if you are admin or not, you won't be able to guess the flag name" ]
[]
Web Exploitation
Medium
125
Easy Peasy
7f9da29f40499a98db220380a57746a4
A one-time pad is unbreakable, but can you manage to recover the flag? (Wrap with picoCTF{}) nc mercury.picoctf.net 36981 otp.py
[ "Maybe there's a way to make this a 2x pad." ]
[ "https://mercury.picoctf.net/static/6920807ae08f883dbb50f6f301f92684/otp.py" ]
General Skills
Medium
129
Matryoshka doll
4f11048e83ffc7d342a15bd2309b47de
Matryoshka dolls are a set of wooden dolls of decreasing size placed one inside another. What's the final one?
[ "Wait, you can hide files inside files? But how do you find them?", "Make sure to submit the flag as picoCTF{XXXXX}" ]
[ "https://mercury.picoctf.net/static/b6205dd933ec01c022c4e6acbdf11116/dolls.jpg" ]
Forensics
Medium
130
MacroHard WeakEdge
D1d_u_kn0w_ppts_r_z1p5
I've hidden a flag in this file. Can you find it? Forensics is fun.pptm
[]
[ "https://mercury.picoctf.net/static/2e739f9e0dc9f4c1556ea6b033c3ec8e/Forensics%20is%20fun.pptm" ]
Forensics
Medium
142
Who are you?
http_h34d3rs_v3ry_c0Ol_much_w0w_8d5d8d77
Let me in. Let me iiiiiiinnnnnnnnnnnnnnnnnnnn http://mercury.picoctf.net:46199/
[ "It ain't much, but it's an RFC https://tools.ietf.org/html/rfc2616" ]
[]
Web Exploitation
Medium
146
Cache Me Outside
53be92758865dfd2779fa96526dbd0a3
While being super relevant with my meme references, I wrote a program to see how much you understand heap allocations. nc mercury.picoctf.net 49825
[ "It may be helpful to read a little bit on GLIBC's tcache." ]
[ "https://mercury.picoctf.net/static/044d5d7c9f7e469d9fed513aea8617c6/heapedit", "https://mercury.picoctf.net/static/044d5d7c9f7e469d9fed513aea8617c6/Makefile", "https://mercury.picoctf.net/static/044d5d7c9f7e469d9fed513aea8617c6/libc.so.6" ]
Binary Exploitation
Hard
152
Some Assembly Required 1
d88090e679c48f3945fcaa6a7d6d70c5
http://mercury.picoctf.net:36152/index.html
[]
[]
Web Exploitation
Medium
154
No Padding, No Problem
m4yb3_Th0se_m3s54g3s_4r3_difurrent_3279013
Oracles can be your best friend, they will decrypt anything, except the flag's ciphertext. How will you break it? Connect with nc mercury.picoctf.net 60368.
[ "What can you do with a different pair of ciphertext and plaintext? What if it is not so different after all..." ]
[]
Cryptography
Medium
158
New Caesar
et_tu?_07d5c0892c1438d2b32600e83dc2b0e5
We found a brand new type of encryption, can you break the secret code? (Wrap with picoCTF{}) dcebcmebecamcmanaedbacdaanafagapdaaoabaaafdbapdpaaapadanandcafaadbdaapdpandcac
[ "How does the cipher work if the alphabet isn't 26 letters?", "Even though the letters are split up, the same paradigms still apply" ]
[ "https://mercury.picoctf.net/static/226a5ad9c9cb528673058d06d4c4380b/new_caesar.py" ]
Cryptography
Medium
159
Dachshund Attacks
proving_wiener_8652838
What if d is too small? Connect with nc mercury.picoctf.net 30761.
[ "What do you think about my pet? https://mercury.picoctf.net/static/817a74a86bcd5f69113e6f2453651cc2/dachshund.jpg" ]
[]
Cryptography
Medium
163
Static ain't always noise
d15a5m_t34s3r_6f8c8200
Can you look at the data in this binary: static? This BASH script might help!
[]
[ "https://mercury.picoctf.net/static/0f6ea599582dcce7b4f1ba94e3617baf/static", "https://mercury.picoctf.net/static/0f6ea599582dcce7b4f1ba94e3617baf/ltdis.sh" ]
General Skills
Easy
175
crackme-py
1|\/|_4_p34|\|ut_f3bc410e
crackme.py
[]
[ "https://mercury.picoctf.net/static/b7cabaae6561256c50728d3515db3058/crackme.py" ]
Reverse Engineering
Medium
176
Tab, Tab, Attack
l3v3l_up!_t4k3_4_r35t!_2bcfb2ab
Using tabcomplete in the Terminal will add years to your life, esp. when dealing with long rambling directory structures and filenames: Addadshashanammu.zip
[ "After `unzip`ing, this problem can be solved with 11 button-presses...(mostly Tab)..." ]
[ "https://mercury.picoctf.net/static/9689f2b453ad5daeb73ca7534e4d1521/Addadshashanammu.zip" ]
General Skills
Easy
179
Here's a LIBC
1_<3_sm4sh_st4cking_fb2de5a40ccfb50c
I am once again asking for you to pwn this binary vuln libc.so.6 Makefile nc mercury.picoctf.net 23584
[ "PWNTools has a lot of useful features for getting offsets." ]
[ "https://mercury.picoctf.net/static/db3de64aff99326d98a0a12efcc57e7b/vuln", "https://mercury.picoctf.net/static/db3de64aff99326d98a0a12efcc57e7b/libc.so.6", "https://mercury.picoctf.net/static/db3de64aff99326d98a0a12efcc57e7b/Makefile" ]
Binary Exploitation
Hard
188
Mini RSA
n33d_a_lArg3r_e_606ce004
What happens if you have a small exponent? There is a twist though, we padded the plaintext so that (M ** e) is just barely larger than N. Let's decrypt this: ciphertext
[ "RSA tutorial (https://en.wikipedia.org/wiki/RSA_(cryptosystem))", "How could having too small of an e affect the security of this key?", "Make sure you don't lose precision, the numbers are pretty big (besides the e value)", "You shouldn't have to make too many guesses", "pico is in the flag, but not at the beginning" ]
[ "https://mercury.picoctf.net/static/a24cf907007a19dbf30310acad0df9e5/ciphertext" ]
Cryptography
Medium
200
login
53rv3r_53rv3r_53rv3r_53rv3r_53rv3r
My dog-sitter's brother made this website but I can't get in; can you help? https://login.mars.picoctf.net/
[]
[]
Web Exploitation
Medium
238
Codebook
c0d3b00k_455157_d9aa2df2
Run the Python script code.py in the same directory as codebook.txt.
[ "On the webshell, use ls to see if both files are in the directory you are in", "The str_xor function does not need to be reverse engineered for this challenge." ]
[ "https://artifacts.picoctf.net/c/1/code.py", "https://artifacts.picoctf.net/c/1/codebook.txt" ]
General Skills
Easy
239
convertme.py
4ll_y0ur_b4535_722f6b39
Run the Python script and convert the given number from decimal to binary to get the flag.
[ "Look up a decimal to binary number conversion app on the web or use your computer's calculator!", "The str_xor function does not need to be reverse engineered for this challenge.", "If you have Python on your computer, you can download the script normally and run it. Otherwise, use the wget command in the webshell.", "To use wget in the webshell, first right click on the download link and select 'Copy Link' or 'Copy Link Address'", "Type everything after the dollar sign in the webshell: $ wget , then paste the link after the space after wget and press enter. This will download the script for you in the webshell so you can run it!", "Finally, to run the script, type everything after the dollar sign and then press enter: $ python3 convertme.py" ]
[ "https://artifacts.picoctf.net/c/24/convertme.py" ]
General Skills
Easy
245
PW Crack 1
545h_r1ng1ng_fa343060
Can you crack the password to get the flag? Download the password checker here and you'll need the encrypted flag in the same directory too.
[ "To view the file in the webshell, do: $ nano level1.py", "To exit nano, press Ctrl and x and follow the on-screen prompts.", "The str_xor function does not need to be reverse engineered for this challenge." ]
[ "https://artifacts.picoctf.net/c/11/level1.py", "https://artifacts.picoctf.net/c/11/level1.flag.txt.enc" ]
General Skills
Easy
246
PW Crack 2
tr45h_51ng1ng_489dea9a
Can you crack the password to get the flag? Download the password checker here and you'll need the encrypted flag in the same directory too.
[ "Does that encoding look familiar?", "The str_xor function does not need to be reverse engineered for this challenge." ]
[ "https://artifacts.picoctf.net/c/13/level2.py", "https://artifacts.picoctf.net/c/13/level2.flag.txt.enc" ]
General Skills
Easy
247
PW Crack 3
m45h_fl1ng1ng_cd6ed2eb
Can you crack the password to get the flag? Download the password checker here and you'll need the encrypted flag and the hash in the same directory too. There are 7 potential passwords with 1 being correct. You can find these by examining the password checker script.
[ "To view the level3.hash.bin file in the webshell, do: $ bvi level3.hash.bin", "To exit bvi type :q and press enter.", "The str_xor function does not need to be reverse engineered for this challenge." ]
[ "https://artifacts.picoctf.net/c/17/level3.py", "https://artifacts.picoctf.net/c/17/level3.flag.txt.enc", "https://artifacts.picoctf.net/c/17/level3.hash.bin" ]
General Skills
Medium
249
PW Crack 5
h45h_sl1ng1ng_40f26f81
Can you crack the password to get the flag? Download the password checker here and you'll need the encrypted flag and the hash in the same directory too. Here's a dictionary with all possible passwords based on the password conventions we've seen so far.
[ "Opening a file in Python is crucial to using the provided dictionary.", "You may need to trim the whitespace from the dictionary word before hashing. Look up the Python string function, strip", "The str_xor function does not need to be reverse engineered for this challenge." ]
[ "https://artifacts.picoctf.net/c/32/level5.py", "https://artifacts.picoctf.net/c/32/level5.flag.txt.enc", "https://artifacts.picoctf.net/c/32/level5.hash.bin", "https://artifacts.picoctf.net/c/32/dictionary.txt" ]
General Skills
Medium
251
Serpentine
7h3_r04d_l355_7r4v3l3d_8e47d128
Find the flag in the Python script!
[ "Try running the script and see what happens", "In the webshell, try examining the script with a text editor like nano", "To exit nano, press Ctrl and x and follow the on-screen prompts.", "The str_xor function does not need to be reverse engineered for this challenge." ]
[ "https://artifacts.picoctf.net/c/37/serpentine.py" ]
General Skills
Medium
348
FindAndOpen
R34DING_LOKd_fil56_succ3ss_5ed3a878
Someone might have hidden the password in the trace file. Find the key to unlock this file. This tracefile might be good to analyze.
[ "Download the pcap and look for the password or flag.", "Don't try to use a password cracking tool, there are easier ways here." ]
[ "https://artifacts.picoctf.net/c/496/dump.pcap", "https://artifacts.picoctf.net/c/496/flag.zip" ]
Forensics
Medium
351
HideToSee
atbash_crack_ac751ec6
How about some hide and seek heh? Look at this image here.
[ "Download the image and try to extract it." ]
[ "https://artifacts.picoctf.net/c/236/atbash.jpg" ]
Cryptography
Medium
362
PcapPoisoning
P64P_4N4L7S1S_SU55355FUL_5b6a6061
How about some hide and seek heh? Download this file and find the flag.
[]
[ "https://artifacts.picoctf.net/c/375/trace.pcap" ]
Forensics
Medium
372
Reverse
3lf_r3v3r5ing_succe55ful_9ae85289
Try reversing this file? Can ya? I forgot the password to this file. Please find it for me?
[]
[ "https://artifacts.picoctf.net/c/276/ret" ]
Reverse Engineering
Medium
375
Safe Opener 2
SAf3_0p3n3rr_y0u_solv3d_it_de45efd6
What can you do with this file? I forgot the key to my safe but this file is supposed to help me with retrieving the lost key. Can you help me unlock my safe?
[ "Download and try to decompile the file." ]
[ "https://artifacts.picoctf.net/c/289/SafeOpener.class" ]
Reverse Engineering
Medium
381
timer
t1m3r_r3v3rs3d_succ355fully_17496
You will find the flag after analysing this apk
[ "Decompile", "mobsf or jadx" ]
[ "https://artifacts.picoctf.net/c/449/timer.apk" ]
Reverse Engineering
Medium
405
Blame Game
@sk_th3_1nt3rn_e9957ce1
Someone's commits seems to be preventing the program from working. Who is it?
[ "In collaborative projects, many users can make many changes. How can you see the changes within one file?", "Read the chapter on Git from the picoPrimer https://primer.picoctf.org/#_git_version_control.", "You can use python3 <file>.py to try running the code, though you won't need to for this challenge." ]
[ "https://artifacts.picoctf.net/c_titan/73/challenge.zip" ]
General Skills
Easy
412
Custom encryption
custom_d2cr0pt6d_019c831c
Can you get sense of this code file and write the function that will decode the given encrypted file content. Find the encrypted file here flag_info and code file might be good to analyze and get the flag.
[ "Understanding encryption algorithm to come up with decryption algorithm." ]
[ "https://artifacts.picoctf.net/c_titan/93/enc_flag", "https://artifacts.picoctf.net/c_titan/93/custom_encryption.py" ]
Cryptography
Medium
80
Irish-Name-Repo 1
s0m3_SQL_fb3fe2ad
There is a website running at https://jupiter.challenges.picoctf.org/problem/50009/. Do you think you can log us in? Try to see if you can login!
[ "There doesn't seem to be many ways to interact with this. I wonder if the users are kept in a database?", "Try to think about how the website verifies your login." ]
[]
Web Exploitation
Medium
77
vault-door-5
c0nv3rt1ng_fr0m_ba5e_64_e3152bf4
In the last challenge, you mastered octal (base 8), decimal (base 10), and hexadecimal (base 16) numbers, but this vault door uses a different change of base as well as URL encoding!
[ "You may find an encoder/decoder tool helpful, such as https://encoding.tools/", "Read the wikipedia articles on URL encoding and base 64 encoding to understand how they work and what the results look like." ]
[ "https://jupiter.challenges.picoctf.org/static/d31ce4356bdfd15d33a9af7e35ab4d0a/VaultDoor5.java" ]
Reverse Engineering
Medium
74
What Lies Within
h1d1ng_1n_th3_b1t5
Theres something in the building. Can you retrieve the flag?
[ "There is data encoded somewhere... there might be an online decoder." ]
[ "https://jupiter.challenges.picoctf.org/static/011955b303f293d60c8116e6a4c5c84f/buildings.png" ]
Forensics
Medium
73
miniRSA
n33d_a_lArg3r_e_606ce004
Let's decrypt this: ciphertext? Something seems a bit small.
[ "RSA tutorial (https://en.wikipedia.org/wiki/RSA_(cryptosystem))", "How could having too small an e affect the security of this 2048 bit key?", "Make sure you don't lose precision, the numbers are pretty big (besides the e value)" ]
[ "https://jupiter.challenges.picoctf.org/static/ee7e2388b45f521b285334abb5a63771/ciphertext" ]
Cryptography
Hard
71
vault-door-4
jU5t_4_bUnCh_0f_bYt3s_8f4a6cbf3b
This vault uses ASCII encoding for the password.
[ "Use a search engine to find an 'ASCII table'.", "You will also need to know the difference between octal, decimal, and hexadecimal numbers." ]
[ "https://jupiter.challenges.picoctf.org/static/c695ee23309d453a3ef369c34cc1bccb/VaultDoor4.java" ]
Reverse Engineering
Medium
69
Client-side-again
not_this_again_50a029
Can you break into this super secure portal? https://jupiter.challenges.picoctf.org/problem/6353/
[ "What is obfuscation?" ]
[]
Web Exploitation
Medium
67
Bases
l3arn_th3_r0p35
What does this bDNhcm5fdGgzX3IwcDM1 mean? I think it has something to do with bases.
[ "Submit your answer in our flag format. For example, if your answer was 'hello', you would submit 'picoCTF{hello}' as the flag." ]
[]
General Skills
Easy
65
vault-door-7
A_b1t_0f_b1t_sh1fTiNg_dc80e28124
This vault uses bit shifts to convert a password string into an array of integers. Hurry, agent, we are running out of time to stop Dr. Evil's nefarious plans!
[ "Use a decimal/hexadecimal converter such as this one: https://www.mathsisfun.com/binary-decimal-hexadecimal-converter.html", "You will also need to consult an ASCII table such as this one: https://www.asciitable.com/" ]
[ "https://jupiter.challenges.picoctf.org/static/301ede7795d964123b7a7d99af89723f/VaultDoor7.java" ]
Reverse Engineering
Hard
62
13
not_too_bad_of_a_problem
Cryptography can be easy, do you know what ROT13 is? cvpbPGS{abg_gbb_onq_bs_n_ceboyrz}
[ "This can be solved online if you don't want to do it by hand!" ]
[]
Cryptography
Easy
61
rsa-pop-quiz
wA8_th4t$_ill3aGal..oa2d2239b
Class, take your seats! It's PRIME-time for a quiz... nc jupiter.challenges.picoctf.org 18821
[ "RSA info (https://simple.wikipedia.org/wiki/RSA_algorithm)" ]
[]
Cryptography
Hard
60
vault-door-3
jU5t_a_s1mpl3_an4gr4m_4_u_79958f
This vault uses for-loops and byte arrays.
[ "Make a table that contains each value of the loop variables and the corresponding buffer index that it writes to." ]
[ "https://jupiter.challenges.picoctf.org/static/943ea40e3f54fca6d2145fa7aadc5e09/VaultDoor3.java" ]
Reverse Engineering
Medium
59
Irish-Name-Repo 2
m0R3_SQL_plz_c34df170
There is a website running at https://jupiter.challenges.picoctf.org/problem/53751/. Someone has bypassed the login before, and now it's being strengthened. Try to see if you can still login!
[ "The password is being filtered." ]
[]
Web Exploitation
Medium
58
Warmed Up
61
What is 0x3D (base 16) in decimal (base 10)?
[ "Submit your answer in our flag format. For example, if your answer was '22', you would submit 'picoCTF{22}' as the flag." ]
[]
General Skills
Easy
52
extensions
now_you_know_about_extensions
This is a really weird text file TXT? Can you find the flag?
[ "How do operating systems know what kind of file it is? (It's not just the ending!", "Make sure to submit the flag as picoCTF{XXXXX}" ]
[ "https://jupiter.challenges.picoctf.org/static/e7e5d188621ee705ceeb0452525412ef/flag.txt" ]
Forensics
Medium
48
plumbing
digital_plumb3r_ea8bfec7
Sometimes you need to handle process data outside of a file. Can you find a way to keep the output from this program and search for the flag? Connect to jupiter.challenges.picoctf.org 14291.
[ "Remember the flag format is picoCTF{XXXX}", "What's a pipe? No not that kind of pipe... This kind http://www.linfo.org/pipes.html" ]
[]
General Skills
Medium
46
logon
th3_c0nsp1r4cy_l1v3s_6edb3f5f
The factory is hiding things from all of its users. Can you login as Joe and find what they've been looking at? https://jupiter.challenges.picoctf.org/problem/15796/
[ "Hmm it doesn't seem to check anyone's password, except for Joe's?" ]
[]
Web Exploitation
Easy
45
vault-door-6
n0t_mUcH_h4rD3r_tH4n_x0r_948b888
This vault uses an XOR encryption scheme.
[ "If X ^ Y = Z, then Z ^ Y = X. Write a program that decrypts the flag based on this fact." ]
[ "https://jupiter.challenges.picoctf.org/static/937a166e2c8c5bf34928a2dab22e8ade/VaultDoor6.java" ]
Reverse Engineering
Medium
68
The Numbers
picoctf{thenumbersmason
The numbers... what do they mean?
[ "The flag is in the format PICOCTF{}" ]
[ "https://jupiter.challenges.picoctf.org/static/f209a32253affb6f547a585649ba4fda/the_numbers.png" ]
Cryptography
Easy
40
Mr-Worldwide
KODIAK_ALASKA
A musician left us a message. What's it mean?
[]
[ "https://jupiter.challenges.picoctf.org/static/d5570d48262dbba2a31f2a940409ad9d/message.txt" ]
Cryptography
Medium
38
waves over lambda
frequency_is_c_over_lambda_dnvtfrtayu
We made a lot of substitutions to encrypt this. Can you decrypt it? Connect with nc jupiter.challenges.picoctf.org 13758.
[ "Flag is not in the usual flag format" ]
[]
Cryptography
Medium
35
Based
learning_about_converting_values_02167de8
To get truly 1337, you must understand different data encodings, such as hexadecimal or binary. Can you get the flag from this program to prove you are on the way to becoming 1337? Connect with nc jupiter.challenges.picoctf.org 15130.
[ "I hear python can convert things.", "It might help to have multiple windows open." ]
[]
General Skills
Medium
34
what's a net cat?
nEtCat_Mast3ry_d0c64587
Using netcat (nc) is going to be pretty important. Can you connect to jupiter.challenges.picoctf.org at port 25103 to get the flag?
[ "nc tutorial (https://linux.die.net/man/1/nc)" ]
[]
General Skills
Easy
31
Flags
F1AG5AND5TUFF
What do the flags mean?
[ "The flag is in the format PICOCTF{}" ]
[ "https://jupiter.challenges.picoctf.org/static/fbeb5f9040d62b18878d199cdda2d253/flag.png" ]
Cryptography
Medium
30
shark on wire 1
StaT31355_636f6e6e
We found this packet capture. Recover the flag.
[ "Try using a tool like Wireshark", "What are streams?" ]
[ "https://jupiter.challenges.picoctf.org/static/483e50268fe7e015c49caf51a69063d0/capture.pcap" ]
Forensics
Medium
22
Lets Warm Up
p
If I told you a word started with 0x70 in hexadecimal, what would it start with in ASCII?
[ "Submit your answer in our flag format. For example, if your answer was 'hello', you would submit 'picoCTF{hello}' as the flag." ]
[]
General Skills
Easy
21
Tapping
PICOCTF{M0RS3C0D31SFUN2683824610
Theres tapping coming in from the wires. What's it saying nc jupiter.challenges.picoctf.org 9422.
[ "What kind of encoding uses dashes and dots?", "The flag is in the format PICOCTF{}" ]
[]
Cryptography
Medium
18
Insp3ct0r
tru3_d3t3ct1ve_0r_ju5t_lucky?f10be399
Kishor Balan tipped us off that the following code may need inspection: https://jupiter.challenges.picoctf.org/problem/44924/
[ "How do you inspect web code on a browser?", "There's 3 parts" ]
[]
Web Exploitation
Easy
9
picobrowser
p1c0_s3cr3t_ag3nt_51414fa7
This website can be rendered only by picobrowser, go and catch the flag! https://jupiter.challenges.picoctf.org/problem/50522/
[ "You don't need to download a new web browser" ]
[]
Web Exploitation
Medium
8
Irish-Name-Repo 3
3v3n_m0r3_SQL_4424e7af
There is a secure website running at https://jupiter.challenges.picoctf.org/problem/40742/. Try to see if you can login as admin!
[ "Seems like the password is encrypted." ]
[]
Web Exploitation
Medium
3
la cifra de
b311a50_0r_v1gn3r3_c1ph3ra966878a
I found this cipher in an old book. Can you figure out what it says? Connect with nc jupiter.challenges.picoctf.org 58295.
[ "There are tools that make this easy.", "Perhaps looking at history will help" ]
[]
Cryptography
Medium
186
information
the_m3tadata_1s_modified
Files can always be changed in a secret way. Can you find the flag? cat.jpg
[ "Look at the details of the file", "Make sure to submit the flag as picoCTF{XXXXX}" ]
[ "https://mercury.picoctf.net/static/e5825f58ef798fdd1af3f6013592a971/cat.jpg" ]
Forensics
Easy
180
Super Serial
th15_vu1n_1s_5up3r_53r1ous_y4ll_8db8f85c
Try to recover the flag stored on this website http://mercury.picoctf.net:2148/
[ "The flag is at ../flag" ]
[]
Web Exploitation
Medium
End of preview. Expand in Data Studio

PicoCTF Challenges

This dataset was originally only available on GitHub under agpl-3.0 license. I ported it to Hugging Face after making small corrections.

Downloads last month
86