A collection of CTF writeups and solutions.
A CTF (short for Capture the Flag Competition) is a gamified computer security competition where players solve information security-related challenges to gain points. Although these competitions don’t involve running around to capture a flag, the underlying concept is the same.
In security CTFs, challengers compete to find a flag (usually a long sequence of characters) using modern hacking techniques.
CTFs can be categorized into three main categories:
- Jeopardy-style CTFs: These are the most popular kind of CTFs which involve solving a set of tasks from varying categories such as web exploitation, reverse engineering, cryptography, etc.
- Attack-defence CTFs: These involve each team being given their own vulnerable server and services. To succeed, teams must find exploits in and attack their opponents’ networks while protecting their own.
- Mixed CTFs: These can vary in possible formats and are a mix of the Jeopardy-style and Attack-defence competitions.
- Web Security
- General Information
- Malware Reverse Engineering
- Cryptography
- Exploitation
- Network Security
- OSINT (Open Source Intelligence)
Web Security Challenges README
This section contains challenges related to web security, covering topics such as XSS, SQL injection, CSRF, etc.
General Information Challenges README
Explore challenges that test your general knowledge in the field of cybersecurity.
Malware Reverse Engineering Challenges README
Dive into challenges focused on analyzing and understanding malware through reverse engineering.
Cryptography Challenges README
Discover challenges involving cryptographic puzzles, encryption, and decryption techniques.
Exploitation Challenges README
Learn about exploitation techniques in challenges designed to test your skills in finding vulnerabilities and exploiting them.
Network Security Challenges README
Explore challenges related to network security, protocols, and packet analysis.
Engage in challenges that require gathering information from publicly available sources to solve problems.
Feel free to contribute your own solutions to challenges or suggest improvements! Create a pull request or open an issue.
Created By Mohamed Doukkani with ❤️, Happy hacking!