Rows:
| CHALLENGE | AUTHORS | SOLVES (CURRENT) | SOLVE RATE (AT CONTEST TIME) |
|---|---|---|---|
AlpacaHack 2100Misc | 1633 solves | - | |
WelcomeMisc | 1544 solves | - | |
a fact of CTFCrypto | 883 solves | - | |
Simple LoginWeb | 611 solves | Top 28% = 84/300 users | |
EmojifyWeb | 594 solves | - | |
567 solves | - | ||
505 solves | Top 73% = 683/928 teams | ||
super-tomatoCrypto | 389 solves | - | |
hit-and-missMisc | 387 solves | - | |
echoPwn | 357 solves | Top 32% = 56/174 users | |
Xmas LoginWeb | 353 solves | - | |
343 solves | - | ||
Alpaca BankWeb | 331 solves | - | |
325 solves | - | ||
size limitCrypto | 317 solves | - | |
Encoding BasicsMisc Crypto | 317 solves | - | |
312 solves | - | ||
🐈Web | 309 solves | - | |
BarsWeb | 299 solves | - | |
108Misc | 296 solves | - |
Rows:
The very first challenge ever completed for AlpacaHack was never released because we adjusted the difficulty for the first Crypto round. (Organizers' note)
a-fact-of-CTF.tar.gz and extracting it.chall.py, the environment variable FLAG is read. This is the flag.chall.py is output.txt.output.txt.