ctfnote
Ctrlk
  • /home/ret2basic.eth
  • Web3 Security Research
    • πŸ‘‘Web3 Security Research Trivia
    • DeFi
    • πŸ‘‘Secureum
    • βœ…Solidity
    • βœ…Foundry
    • EVM
      • βœ…Andreas Antonopoulos - The Ethereum Virtual Machine
      • βœ…Program The Blockchain - Smart Contract Storage
      • βœ…EVM Codes - EVM Playground for Opcodes
      • βœ…Fvictorio - EVM Puzzles
      • βœ…Daltyboy11 - More EVM Puzzles
      • βœ…EVM Through Huff
      • Noxx - EVM Deep Dives
      • βœ…Jordan McKinney - EVM Explained
      • Openzepplin - Deconstructing a Solidity Contract
      • Jeancvllr - EVM Assembly
      • Peter Robinson - Solidity to Bytecode, Memory & Storage
      • Marek Kirejczyk - Ethereum Under The Hood
      • βœ…Official Solidity Docs
      • Dissecting EVM using go-ethereum Eth client implementation - deliriusz.eth
    • Vulnerabilities
  • Game Hacking
    • βœ…C++
    • Ghidra
    • Cheat Engine
    • Proxy
    • DLL injection
    • Keygen
    • Aimbot
  • Red Teaming
    • βœ…Enumeration
    • βœ…Exploitation
    • βœ…Buffer Overflow
    • βœ…Privilege Escalation
    • βœ…Post Exploitation
    • βœ…Pivoting
    • Active Directory (AD)
    • Command & Control (C2)
    • Malware Development
  • Cryptography
    • Hash Functions
    • MAC
    • AES
    • Diffie-Hellman
    • RSA
    • ECC
    • Digital Signature
    • JWT
    • PRNG
    • SSL/TLS
    • Research
  • Computer Science
    • Linux
    • Python
    • HTML, CSS, JavaScript, and React
    • Data Structures and Algorithms
    • The Linux Programming Interface
    • Computer Systems
    • Databases
    • Distributed Systems
    • Static Analysis
  • Web
    • βœ…Prerequisites
    • File Upload
    • SQL Injection (SQLi)
    • Cross-Site Scripting (XSS)
    • CSRF and SSRF
    • XML External Entities (XXE)
    • Insecure Deserialization
    • HTTP Request Smuggling
    • OS Command Injection
    • βœ…Directory Traversal
    • HTTP Parameter Pollution
    • Server-Side Template Injection (SSTI)
    • LDAP Injection
    • Redis
  • Pwn
    • Linux Exploitation
    • Windows Exploitation
    • Fuzzing
  • Reverse
    • Bytecode
    • πŸ‘‘Z3 solver
    • angr
Powered by GitBook
On this page
  1. Web3 Security Research
  2. EVM

βœ…Fvictorio - EVM Puzzles

My writeup:

Logoctfwriteup.com is for sale! Check it out on ExpiredDomains.comExpiredDomains.com
EVM Puzzles
PreviousEVM Codes - EVM Playground for OpcodesNextDaltyboy11 - More EVM Puzzles

Last updated 2 years ago

Was this helpful?

Was this helpful?