We covered a scenario that demonstrates python exploitation through Eval function. Additionally we covered an example of XOR encryption and decryption. This was part of TryHackMe Devie

Get OSCP Notes

Room Answers

What is the first flag?

What is the second flag?

What is the root flag?

Video Walkthrough

About the Author

I create cybersecurity notes, digital marketing notes and online courses. I also provide digital marketing consulting including but not limited to SEO, Google & Meta ads and CRM administration.

View Articles