The System Security research group (S2G) at NTNU have organized semi-weekly CTF competitions with a different main focus each time (web, mobile, osint, forensics etc.). I will create writeups for some of the more interesting challenges, and the ones I learned the most from.
Patching an ELF with exponential sleeping, to run faster and print the flag.
Exploiting pythons _reduce_ to create a payload that when loaded on the server gives us a reverse shell.
Pwning a small binary with sigreturn and multiple syscalls.