CHALLENGE DESCRIPTION
I disabled right click so this is secure.
Flag Format: flag{}

Since, it is mentioned in the challg.description that Right-click is disabled, it shows something is hidden inside the page-source code. Normally, for viewing source what we do is, Right click on page +view page source.
No worries, that can’t stop us from finding flag. We have another shortcut..
shortcut: ctrl+u - to view page- source code
CHALLENGE DESCRIPTION
Jimmy found out about an embarrassing picture of his dad Steve. He believes that there is a text inside that file somewhere. But he is too scared to open and tamper with it as his father is a very short tempered man. Help Jimmy out!
Flag format — inctfj{flag_here}
We are given a jpeg file. To extract hidden data, we can make use of strings command.
strings -print the sequences of printable characters in files
CHALLENGE DESCRIPTION
Looks like before Alice gave the key in wrong hands and someone misused it ;). This time the ciphertext is given to you and seems like the magic of XOR has been done on it again! Can you decrypt the given ciphertext and get the original message back?
The ciphertext has been encoded in one of the common encoding format.
Flag Format: inctfj{...}

Decrypt the given ciphertext using Hex-decoder.
CHALLENGE DESCRIPTION
Given a hex encoded string: 1314190e1c1001024a0825194e145d0e251849251f4e091316032518084a11491407
The above string has been Xored against a single character ‘z’. Decode it to a meaningful sentence and get the flag.
Flag Format: inctfj{...}
We are given a hex-encoded string, we can easily decoded it using an hex-decoder. On decoding, we will get ➡

On xor -ing output string with key z. we will get another hexadecimal string.