AlpacaHack Logo

Challenges

Sign InSign Up

Rows:

CHALLENGEAUTHORS

SOLVES

(CURRENT)

SOLVE RATE

(AT CONTEST TIME)

AlpacaHack 2100

Daily AlpacaHack

admin

1765

solves

-

1575

solves

-

Daily AlpacaHack

937

solves

-

AlpacaHack Round 2 (Web)

630

solves

Top 28%

= 84/300 users

Daily AlpacaHack

624

solves

-

Daily AlpacaHack

607

solves

-

SECCON Beginners CTF 2024

543

solves

Top 73%

= 683/928 teams

Daily AlpacaHack

410

solves

-

Daily AlpacaHack

408

solves

-

Daily AlpacaHack

375

solves

-

Daily AlpacaHack

367

solves

-

echo

AlpacaHack Round 1 (Pwn)

363

solves

Top 32%

= 56/174 users

Daily AlpacaHack

349

solves

-

Daily AlpacaHack

342

solves

-

Daily AlpacaHack

339

solves

-

Daily AlpacaHack

331

solves

-

Encoding Basics

Daily AlpacaHack

331

solves

-

🐈

Daily AlpacaHack

324

solves

-

Bars

Daily AlpacaHack

318

solves

-

108

Daily AlpacaHack

306

solves

-

Rows:

a fact of CTF

Daily AlpacaHackTopic: Python, PrimeReleased: Dec 2, 2025

937 solves
Crypto
Easy🌱

by

xornet

xornet

The very first challenge ever completed for AlpacaHack was never released because we adjusted the difficulty for the first Crypto round. (Organizers' note)

Beginner Hint
  • This challenge is in the Crypto (Cryptography) category.
  • AlpacaHack currently features four main categories: Crypto, Pwn, Rev, and Web; everything else goes into Misc.
  • Start by downloading the attached a-fact-of-CTF.tar.gz and extracting it.
  • In chall.py, the environment variable FLAG is read. This is the flag.
  • The flag is then transformed using prime numbers.
  • The output of chall.py is output.txt.
  • The goal is to recover the flag from the value in output.txt.
a-fact-of-CTF.tar.gz
descriptionsolveswriteups