CTF Write-ups 2013 is a community-driven repository that collects Capture The Flag (CTF) source files and write-ups from competitions that occurred in 2013. The repository serves as an archive where cybersecurity professionals and enthusiasts can access detailed solutions and explanations for various CTF challenges. Contributors can submit their own write-ups through pull requests, making it a collaborative resource for the cybersecurity community. The collection includes source files and documentation that detail how specific CTF challenges were solved, providing educational value for those learning about cybersecurity concepts and techniques. Users can also contribute corrections to existing solutions by submitting pull requests. The repository is part of a larger archive system that spans multiple years, with separate repositories maintained for CTF competitions from 2014, 2015, and 2016. This organizational structure allows users to find write-ups from specific time periods and track the evolution of CTF challenges over time.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A structured approach to managing and responding to suspected security events or incidents.
A comprehensive cheat sheet for using JtR (John the Ripper), a password cracking tool.
A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.
A collection of CTF writeups from various competitions including picoCTF, GLUG, TUCTF, and HackTheBox challenges, providing detailed solutions and explanations for cybersecurity competition problems.
A collection of CTF challenge write-ups and solutions from the SababaSec cybersecurity team covering competitions from 2019 to 2022.
A centralized repository containing CTF source files and write-ups from 2015 competitions, providing accessible documentation and solutions for cybersecurity challenges.
A quick reference guide for the VI editor, covering commands and modes.
Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.
A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.