We covered a scenario that demonstrates python exploitation through Eval function. Additionally we covered an example of XOR encryption and decryption. This was part of TryHackMe Devie
Room Answers
What is the first flag?
What is the second flag?
What is the root flag?
Video Walkthrough
Show Comments