SHA256 hash of the exploit (as a .tar.gz file) which captured the flag(s).
Keep the exploit small, leave out large, publicly available files (vmlinux, bzImage, etc).
If you are submitting multiple exploits for different targets, then put your exploits into separate folders, compress the folders and submit the hash of the compressed .tar.gz file.
Please
do not edit this field after the original submission. If you pwned another target since then, make a new submission (as eligibility depends on the original submission time, so the flags and the exploit hash cannot be modified after the initial submission).
In hex format: [0-9a-f]{64}