-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add picoCTF parser #208
Merged
Merged
Add picoCTF parser #208
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This parses the challenges of the https://play.picoctf.org/ platform.
JJ-8
approved these changes
Mar 24, 2023
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you very much for your contribution! I have pushed only one small beautification suggested by VSCode. The code looks great and I have tested it successfully with the following data:
{"count":45,"next":null,"previous":null,"results":[{"id":345,"name":"babygame01","author":"Palash Oswal","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[{"id":42,"name":"game"}],"sponsor":null,"include_in_gym":true,"rating_percentage":46.464646464646464,"users_attempted":427,"users_solved":282,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nThe game is available to download [here](https://artifacts.picoctf.net/c/225/game). There is no source available, so you'll have to figure your way around the map.","active_assignments":[]},{"id":347,"name":"chrono","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":44,"name":"linux"}],"sponsor":null,"include_in_gym":true,"rating_percentage":38.144329896907216,"users_attempted":1367,"users_solved":1276,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":349,"name":"findme","author":"Geoffrey Njogu","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":52.903225806451616,"users_attempted":1378,"users_solved":1227,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":350,"name":"hideme","author":"Geoffrey Njogu","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[{"id":32,"name":"steganography"}],"sponsor":null,"include_in_gym":true,"rating_percentage":57.2463768115942,"users_attempted":2753,"users_solved":2324,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":351,"name":"HideToSee","author":"Sunday Jacob Nwanyim","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":21.875,"users_attempted":2192,"users_solved":1417,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":true,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":356,"name":"MatchTheRegex","author":"Sunday Jacob Nwanyim","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":48.61111111111111,"users_attempted":1377,"users_solved":1353,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":357,"name":"money-ware","author":"Juni19","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":46,"name":"osint"}],"sponsor":null,"include_in_gym":true,"rating_percentage":46.21848739495798,"users_attempted":3973,"users_solved":3251,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":362,"name":"PcapPoisoning","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[{"id":12,"name":"pcap"}],"sponsor":null,"include_in_gym":true,"rating_percentage":70.58823529411765,"users_attempted":2851,"users_solved":2510,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":true,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":363,"name":"Permissions","author":"Geoffrey Njogu","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":47,"name":"vim"}],"sponsor":null,"include_in_gym":true,"rating_percentage":66.66666666666666,"users_attempted":1318,"users_solved":1269,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":367,"name":"ReadMyCert","author":"Sunday Jacob Nwanyim","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":88.23529411764706,"users_attempted":3252,"users_solved":3202,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":368,"name":"Ready Gladiator 0","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[{"id":48,"name":"CoreWars"}],"sponsor":null,"include_in_gym":true,"rating_percentage":38.297872340425535,"users_attempted":749,"users_solved":709,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nYour opponent is the Imp. The source is available [here](https://artifacts.picoctf.net/c/309/imp.red). If you wanted to pit the Imp against himself, you could download the Imp and start your own corewars server","active_assignments":[]},{"id":371,"name":"repetitions","author":"Theoneste Byagutangaza","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":49,"name":"base64"}],"sponsor":null,"include_in_gym":true,"rating_percentage":84.375,"users_attempted":3273,"users_solved":3141,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":372,"name":"Reverse","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":79.06976744186046,"users_attempted":2827,"users_solved":2778,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":373,"name":"rotation","author":"Loic Shema","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":87.09677419354838,"users_attempted":3309,"users_solved":3184,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":374,"name":"Rules 2023","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[],"sponsor":null,"include_in_gym":false,"rating_percentage":89.70588235294117,"users_attempted":3769,"users_solved":3729,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":375,"name":"Safe Opener 2","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":75.0,"users_attempted":2628,"users_solved":2610,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":376,"name":"SOAP","author":"Geoffrey Njogu","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[{"id":50,"name":"XXE"}],"sponsor":null,"include_in_gym":true,"rating_percentage":63.63636363636363,"users_attempted":746,"users_solved":729,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":381,"name":"timer","author":"Loic Shema","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[{"id":54,"name":"android"}],"sponsor":null,"include_in_gym":true,"rating_percentage":46.93877551020408,"users_attempted":1928,"users_solved":1905,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":382,"name":"two-sum","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[{"id":55,"name":"C"},{"id":56,"name":"make"}],"sponsor":null,"include_in_gym":true,"rating_percentage":69.23076923076923,"users_attempted":869,"users_solved":833,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nWhat two positive numbers can make this possible: `n1 > n1 + n2 OR n2 > n1 + n2`\r\n\r\n [Source](https://artifacts.picoctf.net/c/454/flag.c)","active_assignments":[]},{"id":384,"name":"useless","author":"Loic Shema","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":57,"name":"man"}],"sponsor":null,"include_in_gym":true,"rating_percentage":53.48837209302325,"users_attempted":1010,"users_solved":969,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":385,"name":"Virtual Machine 0","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[{"id":58,"name":"Analog"}],"sponsor":null,"include_in_gym":true,"rating_percentage":24.46808510638298,"users_attempted":527,"users_solved":284,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":388,"name":"who is it","author":"Junias Bonou","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[{"id":61,"name":"email"}],"sponsor":null,"include_in_gym":true,"rating_percentage":61.66666666666667,"users_attempted":2836,"users_solved":2045,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":346,"name":"babygame02","author":"Palash Oswal","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[{"id":42,"name":"game"}],"sponsor":null,"include_in_gym":true,"rating_percentage":45.0,"users_attempted":54,"users_solved":44,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nThe game is available to download [here](https://artifacts.picoctf.net/c/382/game)","active_assignments":[]},{"id":348,"name":"FindAndOpen","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":25.423728813559322,"users_attempted":1356,"users_solved":1045,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":352,"name":"hijacking","author":"Theoneste Byagutangaza","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[{"id":45,"name":"privilege_escalation"}],"sponsor":null,"include_in_gym":true,"rating_percentage":72.72727272727273,"users_attempted":234,"users_solved":214,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":358,"name":"More SQLi","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[{"id":23,"name":"sql"}],"sponsor":null,"include_in_gym":true,"rating_percentage":65.11627906976744,"users_attempted":565,"users_solved":494,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":359,"name":"MSB","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[{"id":32,"name":"steganography"}],"sponsor":null,"include_in_gym":true,"rating_percentage":78.84615384615384,"users_attempted":701,"users_solved":596,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":361,"name":"No way out","author":"Kris","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":58.46153846153847,"users_attempted":726,"users_solved":287,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":366,"name":"PowerAnalysis: Warmup","author":"Anish Singhani","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":55.00000000000001,"users_attempted":108,"users_solved":69,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":369,"name":"Ready Gladiator 1","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[{"id":48,"name":"CoreWars"}],"sponsor":null,"include_in_gym":true,"rating_percentage":76.47058823529412,"users_attempted":326,"users_solved":311,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nYour opponent is the Imp. The source is available [here](https://artifacts.picoctf.net/c/408/imp.red). If you wanted to pit the Imp against himself, you could download the Imp and run your own core wars server","active_assignments":[]},{"id":380,"name":"tic-tac","author":"Junias Bonou","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[{"id":44,"name":"linux"},{"id":51,"name":"bash"},{"id":53,"name":"toctou"}],"sponsor":null,"include_in_gym":true,"rating_percentage":52.94117647058824,"users_attempted":119,"users_solved":110,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":387,"name":"VNE","author":"Junias Bonou","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[{"id":51,"name":"bash"},{"id":59,"name":"env"},{"id":60,"name":"injection"}],"sponsor":null,"include_in_gym":true,"rating_percentage":90.9090909090909,"users_attempted":228,"users_solved":223,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":353,"name":"Horsetrack","author":"madStacks","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":62.5,"users_attempted":25,"users_solved":18,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":300,"gym_points":300,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\n- [vuln](https://artifacts.picoctf.net/c/463/vuln)\r\n- [libc.so.6](https://artifacts.picoctf.net/c/463/libc.so.6)\r\n- [ld-linux-x86-64.so.2](https://artifacts.picoctf.net/c/463/ld-linux-x86-64.so.2)","active_assignments":[]},{"id":354,"name":"Invisible WORDs","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[{"id":32,"name":"steganography"}],"sponsor":null,"include_in_gym":true,"rating_percentage":31.70731707317073,"users_attempted":173,"users_solved":54,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":300,"gym_points":300,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":355,"name":"Java Code Analysis!?!","author":"Nandan Desai","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":72.72727272727273,"users_attempted":513,"users_solved":244,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":300,"gym_points":300,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nSource code can be downloaded [here](https://artifacts.picoctf.net/c/483/bookshelf-pico.zip).","active_assignments":[]},{"id":377,"name":"Special","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":51,"name":"bash"},{"id":52,"name":"ssh"}],"sponsor":null,"include_in_gym":true,"rating_percentage":89.36170212765957,"users_attempted":423,"users_solved":408,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":300,"gym_points":300,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":386,"name":"Virtual Machine 1","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[{"id":58,"name":"Analog"}],"sponsor":null,"include_in_gym":true,"rating_percentage":20.0,"users_attempted":54,"users_solved":42,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":300,"gym_points":300,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nWe grabbed this design doc from enemy servers: [Download](https://artifacts.picoctf.net/c/266/Virtual-Machine-1.zip). We know that the rotation of the red axle is input and the rotation of the blue axle is output. Reverse engineer the mechanism and get past their checker program:","active_assignments":[]},{"id":364,"name":"PowerAnalysis: Part 1","author":"Anish Singhani","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":83.33333333333334,"users_attempted":43,"users_solved":25,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":400,"gym_points":400,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":370,"name":"Ready Gladiator 2","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[{"id":48,"name":"CoreWars"}],"sponsor":null,"include_in_gym":true,"rating_percentage":56.25,"users_attempted":120,"users_solved":113,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":400,"gym_points":400,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nYour opponent is the Imp. The source is available [here](https://artifacts.picoctf.net/c/284/imp.red). If you wanted to pit the Imp against himself, you could download the Imp and run your own core wars server","active_assignments":[]},{"id":378,"name":"Specialer","author":"LT 'syreal' Jones, et al.","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":51,"name":"bash"},{"id":52,"name":"ssh"}],"sponsor":null,"include_in_gym":true,"rating_percentage":77.77777777777779,"users_attempted":345,"users_solved":328,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":400,"gym_points":400,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":379,"name":"SRA","author":"f0xtr0t","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[{"id":26,"name":"rsa"}],"sponsor":null,"include_in_gym":true,"rating_percentage":62.857142857142854,"users_attempted":144,"users_solved":103,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":400,"gym_points":400,"solved_by_user":true,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nDownload the program: [chal.py](https://artifacts.picoctf.net/c/294/chal.py)","active_assignments":[]},{"id":344,"name":"cancri-sp","author":"NotDeGhost","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":57.14285714285714,"users_attempted":15,"users_solved":2,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":500,"gym_points":500,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nDownload [source.tar.gz](https://artifacts.picoctf.net/c/364/source.tar.gz)","active_assignments":[]},{"id":360,"name":"msfroggenerator2","author":"ehhthing","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":72.72727272727273,"users_attempted":93,"users_solved":4,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":500,"gym_points":500,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nSource code: [msfroggenerator2.tar.gz](https://artifacts.picoctf.net/c/448/msfroggenerator2.tar.gz)","active_assignments":[]},{"id":365,"name":"PowerAnalysis: Part 2","author":"Anish Singhani","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":64.28571428571429,"users_attempted":127,"users_solved":36,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":500,"gym_points":500,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":383,"name":"UnforgottenBits","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[{"id":27,"name":"disk"}],"sponsor":null,"include_in_gym":true,"rating_percentage":39.39393939393939,"users_attempted":84,"users_solved":13,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":500,"gym_points":500,"solved_by_user":true,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]}]}
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This parses the challenges of the https://play.picoctf.org/ platform.
You have to paste the json of the
/api/challenges/?page_size=500&page=1&event=XX
endpoint manually whereXX
is the ID of the running event.