7th
Place
9950
Points

Solves (37)

Challenge Category Value Time
Ransom Cache Forensics 350
The Broken Crescent Web Exploitation 350
The Desert Mirage OSINT 350
Echo Chamber Reverse Engineering 350
The Debug Dilemma Web Exploitation 350
Pipeline Phantom Web Exploitation 700
Catalyst Breach Web Exploitation 700
The Tainted Thumbnail Forensics 700
Phantom Relay Web Exploitation 700
The Insider Threat Web Exploitation 700
The Laylat Script Web Exploitation 350
The Crescent Key Cryptography 350
Iftar Fortress Forensics 350
The Truncated Tunnel Cryptography 350
Sadaqah Drive Web Exploitation 150
The Burnt Ledger Forensics 150
Router Backdoor Web Exploitation 150
Noor Gate Web Exploitation 150
The Halal Packet Forensics 150
Ghost in the Router Forensics 150
Taraweeh Terminal Web Exploitation 150
Ramadan Quest Web Exploitation 150
Iftar Interceptor Forensics 150
Black Site Web Exploitation 150
Hilal Sighting Web Exploitation 150
Moonlight Secrets Cryptography 150
Suhoor Broadcast Forensics 150
The Charity Trace Web Exploitation 150
Ghost Protocol Web Exploitation 150
The Generous Cookie Web Exploitation 150
Terminal Velocity Web Exploitation 150
Silent Exfil Networking 150
Password Protected Payload Reverse Engineering 150
Doraemon's Final Gadget Cryptography 150
The Crescent Message Web Exploitation 100
The Fifth Coordinate OSINT 100
Lanterns & Secrets Web Exploitation 100
Solve Ratio
Category Breakdown

Score Over Time