Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

0x544d54_TMT
Capturing flags since Jan. 2013

Twitter: https://twitter.com/0x544d54_TMT

Good at: reverse engineering forensics

Participate in teams

Baghali
gebl
irGeeks
TMT

TMTs writeups

EventTaskAction
RITSEC CTF 2018Lite Forensics [500]read writeup
Hack.lu CTF 2018Snake [324]read writeup
SEC-T CTFZerocool [300]read writeup
Codegate 2017 prequalsHello Protector [420]read writeup
SharifCTF 7What is hidden? [300]read writeup
SharifCTF 7Snake [400]read writeup
SharifCTF 7Tehran [400]read writeup
SharifCTF 7Persian [150]read writeup
SharifCTF 7LSB Oracle [150]read writeup
SharifCTF 7Lobotomized LSB Oracle [400]read writeup
SharifCTF 7Hippotie [250]read writeup
SharifCTF 7Catch Me if You Can! [300]read writeup
SharifCTF 7NoMoreBlind [200]read writeup
SECCON 2016 Online CTFpppppoxy [200]read writeup
HITCON CTF 2016 QualsHandcrafted pyc [50]read writeup
Trend Micro CTF 2016 Online QualifierAnalysis - Offensive 300 [300]read writeup