Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add picoCTF parser #208

Merged
merged 2 commits into from
Mar 24, 2023
Merged

Add picoCTF parser #208

merged 2 commits into from
Mar 24, 2023

Conversation

peace-maker
Copy link
Contributor

This parses the challenges of the https://play.picoctf.org/ platform.

You have to paste the json of the /api/challenges/?page_size=500&page=1&event=XX endpoint manually where XX is the ID of the running event.

This parses the challenges of the https://play.picoctf.org/ platform.
@JJ-8 JJ-8 self-requested a review March 24, 2023 15:29
Copy link
Collaborator

@JJ-8 JJ-8 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you very much for your contribution! I have pushed only one small beautification suggested by VSCode. The code looks great and I have tested it successfully with the following data:

{"count":45,"next":null,"previous":null,"results":[{"id":345,"name":"babygame01","author":"Palash Oswal","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[{"id":42,"name":"game"}],"sponsor":null,"include_in_gym":true,"rating_percentage":46.464646464646464,"users_attempted":427,"users_solved":282,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nThe game is available to download [here](https://artifacts.picoctf.net/c/225/game). There is no source available, so you'll have to figure your way around the map.","active_assignments":[]},{"id":347,"name":"chrono","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":44,"name":"linux"}],"sponsor":null,"include_in_gym":true,"rating_percentage":38.144329896907216,"users_attempted":1367,"users_solved":1276,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":349,"name":"findme","author":"Geoffrey Njogu","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":52.903225806451616,"users_attempted":1378,"users_solved":1227,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":350,"name":"hideme","author":"Geoffrey Njogu","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[{"id":32,"name":"steganography"}],"sponsor":null,"include_in_gym":true,"rating_percentage":57.2463768115942,"users_attempted":2753,"users_solved":2324,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":351,"name":"HideToSee","author":"Sunday Jacob Nwanyim","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":21.875,"users_attempted":2192,"users_solved":1417,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":true,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":356,"name":"MatchTheRegex","author":"Sunday Jacob Nwanyim","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":48.61111111111111,"users_attempted":1377,"users_solved":1353,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":357,"name":"money-ware","author":"Juni19","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":46,"name":"osint"}],"sponsor":null,"include_in_gym":true,"rating_percentage":46.21848739495798,"users_attempted":3973,"users_solved":3251,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":362,"name":"PcapPoisoning","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[{"id":12,"name":"pcap"}],"sponsor":null,"include_in_gym":true,"rating_percentage":70.58823529411765,"users_attempted":2851,"users_solved":2510,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":true,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":363,"name":"Permissions","author":"Geoffrey Njogu","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":47,"name":"vim"}],"sponsor":null,"include_in_gym":true,"rating_percentage":66.66666666666666,"users_attempted":1318,"users_solved":1269,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":367,"name":"ReadMyCert","author":"Sunday Jacob Nwanyim","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":88.23529411764706,"users_attempted":3252,"users_solved":3202,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":368,"name":"Ready Gladiator 0","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[{"id":48,"name":"CoreWars"}],"sponsor":null,"include_in_gym":true,"rating_percentage":38.297872340425535,"users_attempted":749,"users_solved":709,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nYour opponent is the Imp. The source is available [here](https://artifacts.picoctf.net/c/309/imp.red). If you wanted to pit the Imp against himself, you could download the Imp and start your own corewars server","active_assignments":[]},{"id":371,"name":"repetitions","author":"Theoneste Byagutangaza","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":49,"name":"base64"}],"sponsor":null,"include_in_gym":true,"rating_percentage":84.375,"users_attempted":3273,"users_solved":3141,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":372,"name":"Reverse","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":79.06976744186046,"users_attempted":2827,"users_solved":2778,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":373,"name":"rotation","author":"Loic Shema","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":87.09677419354838,"users_attempted":3309,"users_solved":3184,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":374,"name":"Rules 2023","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[],"sponsor":null,"include_in_gym":false,"rating_percentage":89.70588235294117,"users_attempted":3769,"users_solved":3729,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":375,"name":"Safe Opener 2","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":75.0,"users_attempted":2628,"users_solved":2610,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":376,"name":"SOAP","author":"Geoffrey Njogu","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[{"id":50,"name":"XXE"}],"sponsor":null,"include_in_gym":true,"rating_percentage":63.63636363636363,"users_attempted":746,"users_solved":729,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":381,"name":"timer","author":"Loic Shema","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[{"id":54,"name":"android"}],"sponsor":null,"include_in_gym":true,"rating_percentage":46.93877551020408,"users_attempted":1928,"users_solved":1905,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":382,"name":"two-sum","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[{"id":55,"name":"C"},{"id":56,"name":"make"}],"sponsor":null,"include_in_gym":true,"rating_percentage":69.23076923076923,"users_attempted":869,"users_solved":833,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nWhat two positive numbers can make this possible: `n1 > n1 + n2 OR n2 > n1 + n2`\r\n\r\n [Source](https://artifacts.picoctf.net/c/454/flag.c)","active_assignments":[]},{"id":384,"name":"useless","author":"Loic Shema","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":57,"name":"man"}],"sponsor":null,"include_in_gym":true,"rating_percentage":53.48837209302325,"users_attempted":1010,"users_solved":969,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":385,"name":"Virtual Machine 0","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[{"id":58,"name":"Analog"}],"sponsor":null,"include_in_gym":true,"rating_percentage":24.46808510638298,"users_attempted":527,"users_solved":284,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":388,"name":"who is it","author":"Junias Bonou","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[{"id":61,"name":"email"}],"sponsor":null,"include_in_gym":true,"rating_percentage":61.66666666666667,"users_attempted":2836,"users_solved":2045,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":100,"gym_points":100,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":346,"name":"babygame02","author":"Palash Oswal","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[{"id":42,"name":"game"}],"sponsor":null,"include_in_gym":true,"rating_percentage":45.0,"users_attempted":54,"users_solved":44,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nThe game is available to download [here](https://artifacts.picoctf.net/c/382/game)","active_assignments":[]},{"id":348,"name":"FindAndOpen","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":25.423728813559322,"users_attempted":1356,"users_solved":1045,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":352,"name":"hijacking","author":"Theoneste Byagutangaza","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[{"id":45,"name":"privilege_escalation"}],"sponsor":null,"include_in_gym":true,"rating_percentage":72.72727272727273,"users_attempted":234,"users_solved":214,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":358,"name":"More SQLi","author":"Mubarak Mikail","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[{"id":23,"name":"sql"}],"sponsor":null,"include_in_gym":true,"rating_percentage":65.11627906976744,"users_attempted":565,"users_solved":494,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":359,"name":"MSB","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[{"id":32,"name":"steganography"}],"sponsor":null,"include_in_gym":true,"rating_percentage":78.84615384615384,"users_attempted":701,"users_solved":596,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":361,"name":"No way out","author":"Kris","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":58.46153846153847,"users_attempted":726,"users_solved":287,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":366,"name":"PowerAnalysis: Warmup","author":"Anish Singhani","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":55.00000000000001,"users_attempted":108,"users_solved":69,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":369,"name":"Ready Gladiator 1","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[{"id":48,"name":"CoreWars"}],"sponsor":null,"include_in_gym":true,"rating_percentage":76.47058823529412,"users_attempted":326,"users_solved":311,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nYour opponent is the Imp. The source is available [here](https://artifacts.picoctf.net/c/408/imp.red). If you wanted to pit the Imp against himself, you could download the Imp and run your own core wars server","active_assignments":[]},{"id":380,"name":"tic-tac","author":"Junias Bonou","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[{"id":44,"name":"linux"},{"id":51,"name":"bash"},{"id":53,"name":"toctou"}],"sponsor":null,"include_in_gym":true,"rating_percentage":52.94117647058824,"users_attempted":119,"users_solved":110,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":387,"name":"VNE","author":"Junias Bonou","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[{"id":51,"name":"bash"},{"id":59,"name":"env"},{"id":60,"name":"injection"}],"sponsor":null,"include_in_gym":true,"rating_percentage":90.9090909090909,"users_attempted":228,"users_solved":223,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":200,"gym_points":200,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":353,"name":"Horsetrack","author":"madStacks","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":6,"name":"Binary Exploitation"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":62.5,"users_attempted":25,"users_solved":18,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":300,"gym_points":300,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\n- [vuln](https://artifacts.picoctf.net/c/463/vuln)\r\n- [libc.so.6](https://artifacts.picoctf.net/c/463/libc.so.6)\r\n- [ld-linux-x86-64.so.2](https://artifacts.picoctf.net/c/463/ld-linux-x86-64.so.2)","active_assignments":[]},{"id":354,"name":"Invisible WORDs","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[{"id":32,"name":"steganography"}],"sponsor":null,"include_in_gym":true,"rating_percentage":31.70731707317073,"users_attempted":173,"users_solved":54,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":300,"gym_points":300,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":355,"name":"Java Code Analysis!?!","author":"Nandan Desai","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":72.72727272727273,"users_attempted":513,"users_solved":244,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":300,"gym_points":300,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nSource code can be downloaded [here](https://artifacts.picoctf.net/c/483/bookshelf-pico.zip).","active_assignments":[]},{"id":377,"name":"Special","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":51,"name":"bash"},{"id":52,"name":"ssh"}],"sponsor":null,"include_in_gym":true,"rating_percentage":89.36170212765957,"users_attempted":423,"users_solved":408,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":300,"gym_points":300,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":386,"name":"Virtual Machine 1","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[{"id":58,"name":"Analog"}],"sponsor":null,"include_in_gym":true,"rating_percentage":20.0,"users_attempted":54,"users_solved":42,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":300,"gym_points":300,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nWe grabbed this design doc from enemy servers: [Download](https://artifacts.picoctf.net/c/266/Virtual-Machine-1.zip). We know that the rotation of the red axle is input and the rotation of the blue axle is output. Reverse engineer the mechanism and get past their checker program:","active_assignments":[]},{"id":364,"name":"PowerAnalysis: Part 1","author":"Anish Singhani","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":83.33333333333334,"users_attempted":43,"users_solved":25,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":400,"gym_points":400,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":370,"name":"Ready Gladiator 2","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":3,"name":"Reverse Engineering"},"tags":[{"id":48,"name":"CoreWars"}],"sponsor":null,"include_in_gym":true,"rating_percentage":56.25,"users_attempted":120,"users_solved":113,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":400,"gym_points":400,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nYour opponent is the Imp. The source is available [here](https://artifacts.picoctf.net/c/284/imp.red). If you wanted to pit the Imp against himself, you could download the Imp and run your own core wars server","active_assignments":[]},{"id":378,"name":"Specialer","author":"LT 'syreal' Jones, et al.","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":5,"name":"General Skills"},"tags":[{"id":51,"name":"bash"},{"id":52,"name":"ssh"}],"sponsor":null,"include_in_gym":true,"rating_percentage":77.77777777777779,"users_attempted":345,"users_solved":328,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":400,"gym_points":400,"solved_by_user":false,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":379,"name":"SRA","author":"f0xtr0t","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[{"id":26,"name":"rsa"}],"sponsor":null,"include_in_gym":true,"rating_percentage":62.857142857142854,"users_attempted":144,"users_solved":103,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":400,"gym_points":400,"solved_by_user":true,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nDownload the program: [chal.py](https://artifacts.picoctf.net/c/294/chal.py)","active_assignments":[]},{"id":344,"name":"cancri-sp","author":"NotDeGhost","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":57.14285714285714,"users_attempted":15,"users_solved":2,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":500,"gym_points":500,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nDownload [source.tar.gz](https://artifacts.picoctf.net/c/364/source.tar.gz)","active_assignments":[]},{"id":360,"name":"msfroggenerator2","author":"ehhthing","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":1,"name":"Web Exploitation"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":72.72727272727273,"users_attempted":93,"users_solved":4,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":500,"gym_points":500,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"**Due to Instance Launching maintenance, you may access the challenge download file to work offline:**\r\n\r\nSource code: [msfroggenerator2.tar.gz](https://artifacts.picoctf.net/c/448/msfroggenerator2.tar.gz)","active_assignments":[]},{"id":365,"name":"PowerAnalysis: Part 2","author":"Anish Singhani","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":2,"name":"Cryptography"},"tags":[],"sponsor":null,"include_in_gym":true,"rating_percentage":64.28571428571429,"users_attempted":127,"users_solved":36,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":500,"gym_points":500,"solved_by_user":false,"solved_by_team":false,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]},{"id":383,"name":"UnforgottenBits","author":"LT 'syreal' Jones","event":{"id":72,"name":"picoCTF 2023"},"category":{"id":4,"name":"Forensics"},"tags":[{"id":27,"name":"disk"}],"sponsor":null,"include_in_gym":true,"rating_percentage":39.39393939393939,"users_attempted":84,"users_solved":13,"users_attempted_during_event":null,"users_solved_during_event":null,"event_points":500,"gym_points":500,"solved_by_user":true,"solved_by_team":true,"under_maintenance":false,"bookmarked":false,"errata":"","active_assignments":[]}]}

@JJ-8 JJ-8 merged commit 514ce74 into TFNS:main Mar 24, 2023
@peace-maker peace-maker deleted the picoparser branch March 24, 2023 15:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants