A collection of CTF source files and write-ups that anyone can contribute to. Did you just publish a CTF write-up? Let us know, and we'll add a link to your post — or just add the link yourself and submit a pull request. Spot an issue with a solution? Correct it, and send a pull request. Please read CONTRIBUTING.md. Archive Write-ups for CTFs that occurred in 2013 (this repository) Write-ups for CTFs that occurred in 2014 Write-ups for CTFs that occurred in 2015 Write-ups for CTFs that occurred in 2016
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
PLC-side fuzzing tool for uncovering vulnerabilities in ICS control applications.
A microservice for string padding to prevent global issues like the left-pad incident.
Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.
Detailed explanations of steps taken to solve challenges in Capture The Flag competitions.
Free multi-platform database tool with support for various databases and rich features.
Vim syntax-highlighting plugin for YARA rules with support up to v4.3.
echoCTF is a computer security framework for running cybersecurity exercises and competitions like Capture the Flag, used for network penetration testing and security auditing.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.