miscmedium
Who4reu
taipanbyte
Task: File 2.tb identified as WIM image containing obfuscated JavaScript. Solution: Extract JS from WIM container, execute with alert override to get Base32 string, decode to reveal flag.
$ ls tags/ techniques/
base32_decodingjs_deobfuscationarray_shuffle_patternwim_extractionalert_override
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]