$ nmap -sV target$ sqlmap -u "http://?id=1" --batch$ python3 exploit.py$ gobuster dir -u http://target -w wordlist.txt$ ffuf -u https://t/FUZZ -w words.txt$ hashcat -m 1000 hashes.txt dict.txt$ dig target.com ANY +short$ curl -s https://api/ping
[ MAXIM.CTF ]
ctf://homectf://categoriesctf://events[ ← Home ]
← Back to categories

AI / Machine Learning

1 challenge • 365 points

365 pts • KICTF 2026

The Manchurian Candidate

## Challenge Overview We were given a CSV file containing customer tickets and sentiment labels. A backdoor trigger causes the model to predict positi

[ VIEW → ]