2 years agoExploiting a Vulnerable Linked List Implementation - "Links 1" Pwn Challenge [ImaginaryCTF]CryptoCat
2 years agoIntergalactic Recovery [easy]: HackTheBox Forensics Challenge (RAID 5 Disk Recovery)CryptoCat