📄️ 2Warm
- Description: Can you convert the number 42 (base 10) to binary (base 2)?
📄️ Bases
- Description: What does this bDNhcm5fdGgzX3IwcDM1 mean? I think it has something to do with bases.
📄️ Big Zip
- Description: Unzip this archive and find the flag.
📄️ Binary Search
- Description: Want to play a game? As you use more of the shell, you might be interested in how they work! Binary search is a classic algorithm used to quickly find an item in a sorted list. Can you find the flag? You'll have 1000 possibilities and only 10 guesses.
📄️ binhexa
- Description: How well can you perfom basic binary operations?
📄️ Blame Game
- Description: Someone's commits seems to be preventing the program from working. Who is it?
📄️ chrono
- Description: How to automate tasks to run at intervals on linux servers?
📄️ Codebook
- Description: Run the Python script code.py in the same directory as codebook.txt.
📄️ Collaborative Development
- Description: My team has been working very hard on new features for our flag printing program! I wonder how they'll work together?
📄️ Commitment Issues
- Description: I accidentally wrote the flag down. Good thing I deleted it!
📄️ convertme.py
- Description: Run the Python script and convert the given number from decimal to binary to get the flag.
📄️ dont-you-love-banners
- Description: Can you abuse the banner?
📄️ endianness
- Description: Know of little and big endian?
📄️ FANTASY CTF
- Description: Play this short game to get familiar with terminal applications and some of the most important rules in scope for picoCTF.
📄️ First Find
- Description: Unzip this archive and find the file named 'uber-secret.txt'
📄️ First Grep
- Description: Can you find the flag in file? This would be really tedious to look through manually, something tells me there is a better way.
📄️ fixme1.py
- Description: Fix the syntax error in this Python script to print the flag.
📄️ fixme2.py
- Description: Fix the syntax error in this Python script to print the flag.
📄️ Glitch Cat
- Description: Our flag printing service has started glitching!
📄️ HashingJobApp
- Description: If you want to hash with the best, beat this test!
📄️ Lets Warm Up
- Description: If I told you a word started with 0x70 in hexadecimal, what would it start with in ASCII?
📄️ Magikarp Ground Mission
- Description: Do you know how to move between directories and read files in the shell?
📄️ Nice netcat...
- Description nc mercury.picoctf.net 21135, but it doesn't speak English...
📄️ Obedient Cat
- Description: This file has a flag in plain sight (aka "in-the-clear").
📄️ PW Crack 1
- Description: Can you crack the password to get the flag?
📄️ PW Crack 2
- Description: Can you crack the password to get the flag?
📄️ Python Wrangling
- Description: Python scripts are invoked kind of like programs in the Terminal... Can you run this Python script using this password to get the flag?
📄️ repetitions
- Description: Can you make sense of this file?
📄️ runme.py
- Description: Run the runme.py script to get the flag.
📄️ Rust fixme 1
- Description: Have you heard of Rust? Fix the syntax errors in this Rust file to print the flag!
📄️ Rust fixme 2
- Description: The Rust saga continues? I ask you, can I borrow that, pleeeeeaaaasseeeee?
📄️ Rust fixme 3
- Description: Have you heard of Rust? Fix the syntax errors in this Rust file to print the flag!
📄️ Static ain't always noise
- Description static? This BASH script might help!
📄️ strings it
- Description: Can you find the flag in file without running it?
📄️ Super SSH
- Description: Using a Secure Shell (SSH) is going to be pretty important.
📄️ Tab, Tab, Attack
- Description
📄️ Time Machine
- Description: What was I last working on? I remember writing a note to help me remember...
📄️ useless
- Description: There's an interesting script in the user's home directory
📄️ Warmed Up
- Description: What is 0x3D (base 16) in decimal (base 10)?
📄️ Wave a flag
- Description: Can you invoke help flags for a tool or binary? This program has extraordinarily helpful information...
📄️ what's a net cat?
- Description: Using netcat (nc) is going to be pretty important. Can you connect to jupiter.challenges.picoctf.org at port 41120 to get the flag?