webeasy
Dead or alive 2
spbctf
Task: SQL injection bypass challenge where addslashes() is used for input escaping. Solution: Bypass addslashes() protection using MySQL hex encoding (0x...) for string literals instead of quoted strings.
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]