███████╗ ██████╗ ██████╗ ██╗ █████╗ ██╗ ██╗
╚══███╔╝██╔═████╗██╔══██╗███║██╔══██╗██║ ██╔╝
███╔╝ ██║██╔██║██║ ██║╚██║███████║█████╔╝
███╔╝ ████╔╝██║██║ ██║ ██║██╔══██║██╔═██╗
███████╗╚██████╔╝██████╔╝ ██║██║ ██║██║ ██╗
╚══════╝ ╚═════╝ ╚═════╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝
z0d1ak@ctf:~
z0d1ak@ctf:~$ whoami
z0d1ak - CTF Team
z0d1ak@ctf:~$ ls -la /skills
web
crypto
forensics
pwn
reverse
OSINT
z0d1ak@ctf:~$ ./join_team.sh
Initializing recruitment process...
z0d1ak@ctf:~
███████╗ ██████╗ ██████╗ ██╗ █████╗ ██╗ ██╗
╚══███╔╝██╔═████╗██╔══██╗███║██╔══██╗██║ ██╔╝
███╔╝ ██║██╔██║██║ ██║╚██║███████║█████╔╝
███╔╝ ████╔╝██║██║ ██║ ██║██╔══██║██╔═██╗
███████╗╚██████╔╝██████╔╝ ██║██║ ██║██║ ██╗
╚══════╝ ╚═════╝ ╚═════╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝
z0d1ak@ctf:~$ whoami
z0d1ak - Cybersecurity CTF Team
z0d1ak@ctf:~$ ls -la /skills
web
crypto
forensics
pwn
reverse
OSINT
z0d1ak@ctf:~$ cat /etc/motd
Welcome to the z0d1ak CTF team blog
We hack, we learn, we share knowledge.
z0d1ak@ctf:~$ cat /etc/banner
🔐 Specializing in web, crypto, and forensics
🌐 Join our community of CTF enthusiasts
z0d1ak@ctf:~$ ./join_team.sh
Initializing recruitment process...
Active Competitions
CTF events we're currently participating in
competitions.log
z0d1ak@ctf:~$ cat /var/log/competitions.log | sort -r | head -n 5
Displaying latest 5 competition entries...
Latest Writeups
Check out the most recent CTF challenge solutions
writeups.sh
z0d1ak@ctf:~$ ./fetch_writeups.sh --latest=3 --format=detailed
Fetching latest 3 writeups from database...
tsgctf---global-writer-nQxpS.md
December 22, 2025
Binary Exploitation
tsgctf---image-compress-revenge-AE0gJ.md
December 22, 2025
Web Exploitation
TSGCTF - image-compress-revenge
image-compress-revenge
TL;DR
The server runs ImageMagick through bash -c and tries to escape the uploaded filename. By uploading a file whose filename contains a backslash before $ (`$F
Author: theg1239
tsgctf---mission:-impossible-MAN9n.md
December 22, 2025
Web Exploitation