- In the Organization context, the template uses the Organization's Logo
- If not in the Organization context, the template uses the Application Logo
- If the Application Logo is missing, the template uses the Tenant Logo
<!DOCTYPE html> | |
<html lang="en"> | |
<head> | |
{%- auth0:head -%} | |
{% if prompt.screen.name == "device-code-confirmation" %} | |
<script> | |
document.addEventListener("DOMContentLoaded", function() { | |
document.addEventListener("click", function(event) { | |
// Check if the clicked element is a button within a form | |
const clickedButton = event.target.closest("form button"); |
Hello 🧙♂️!
This is an open challenge for those interested in bug bounties. Find a way to decrypt the secret images in this Gist. If you can generate even one of the original images, you win 500 GBP!
All of the steganographic images are hiding different secret images.
The samples are encrypted like in this sample below in folder mode where the /challenge folder had the secret images. As this mode executes the encryption operation in one go, the same base image and the password was used.
PixelLock -e -i ./challange -o ./challange/output -b ./tests/images/base_image.png -r 4
Hello 🧙♂️!
This is an open challenge for those interested in bug bounties. Find a way to decrypt the secret images in this Gist. If you can generate even one of the original images, you win 500 GBP!
Three confidential images are encrypted in two separate attempts.
1- With a base image
PixelLock -e -i ./challenge -o ./challenge/output -b ./tests/images/base_image.png -r 4