$ nmap -sV target$ sqlmap -u "http://?id=1" --batch$ python3 exploit.py$ gobuster dir -u http://target -w wordlist.txt$ ffuf -u https://t/FUZZ -w words.txt$ hashcat -m 1000 hashes.txt dict.txt$ dig target.com ANY +short$ curl -s https://api/ping
[ MAXIM.CTF ]
ctf://homectf://categoriesctf://events[ ← Home ]
← Back to categories

OSINT

1 challenge • 460 points

460 pts • KICTF 2026

Brewed to Disappear

## Challenge Overview We followed a breadcrumb trail across multiple platforms to find Xavier's resignation letter. ### Attack Chain 1. **GitHub** - F

[ VIEW → ]