WebJan 26, 2024 · GitHub - CaptainFreak/Web-CTF-Challenges: Collection of quirky behaviours of code and the CTF challenges that I made around them. CaptainFreak / Web-CTF … WebJun 20, 2024 · How to publish your source code to GitHub! - A Tutorial for Friday Night Funkin'. Friday Night Funkin'TutorialsOther/MiscHow to publish your source code to GitHub! Overview Updates Todos 16 Likes Embed 4 Thanks Admin Permits Withhold Flags Report Feedback Bugs Support Site About FAQ Contact Network gbAPI …
CTF and Morse code ZenithFall-Blog - Personal blog
WebThe goal is to drain token0 from the lenderpool. It has a flashloan function to lend out flashloan in token0, it will check the balance of token0 before and after the token transfer and external call, also it has the nonReentrant modifier. However the swap() function doesn't have the nonReentrant modifier, so it's vulnerable to cross-function reentrancy attack WebMy CTF source code · GitHub Instantly share code, notes, and snippets. sent44 / _ctf.md Last active 7 years ago Star 0 Fork 0 Code Revisions 5 Embed Download ZIP My CTF … frient smart button
Reverse engineering and modifying an Android game (.apk) — CTF
WebThe best solution is to stick with a strict ASCII charset, that is, just don't use any non-ASCII characters in your code. Most programming languages provide ways to express non-ASCII characters using ASCII characters, e.g. "\u1234" to indicate the Unicode code point at 1234. Especially, avoid using non-ASCII characters for identifiers. WebDec 28, 2015 · If you see a sudden spike in DNS traffic, that may be your source code getting exfiltrated by an attacker. OK, now ask yourself if you would even know if there was a sudden spike in DNS traffic from your network. Probably not. Treat mobile devices differently: Phones and laptops get lost really often. They also get stolen really often. fbi informant in whitmer kidnapping