- Published on
Bypassing eval-based restrictions, reconstructing forbidden strings, escaping a builtins blacklist, and exploiting memory manipulation to defeat privilege dropping and read the flag.
-->
This tag contains all posts related to CTF challenges, including write-ups, solutions, and techniques.