CTF Write-ups 2013 Logo

CTF Write-ups 2013

0
Free
233
02 Apr 2016
10 September 2025
Visit Website

CTF Write-ups 2013 is a community-driven repository that collects Capture The Flag (CTF) source files and write-ups from competitions that occurred in 2013. The repository serves as an archive where cybersecurity professionals and enthusiasts can access detailed solutions and explanations for various CTF challenges. Contributors can submit their own write-ups through pull requests, making it a collaborative resource for the cybersecurity community. The collection includes source files and documentation that detail how specific CTF challenges were solved, providing educational value for those learning about cybersecurity concepts and techniques. Users can also contribute corrections to existing solutions by submitting pull requests. The repository is part of a larger archive system that spans multiple years, with separate repositories maintained for CTF competitions from 2014, 2015, and 2016. This organizational structure allows users to find write-ups from specific time periods and track the evolution of CTF challenges over time.

FEATURES

SIMILAR TOOLS

A structured approach to managing and responding to suspected security events or incidents.

A comprehensive cheat sheet for using JtR (John the Ripper), a password cracking tool.

A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.

A collection of CTF writeups from various competitions including picoCTF, GLUG, TUCTF, and HackTheBox challenges, providing detailed solutions and explanations for cybersecurity competition problems.

A collection of CTF challenge write-ups and solutions from the SababaSec cybersecurity team covering competitions from 2019 to 2022.

A centralized repository containing CTF source files and write-ups from 2015 competitions, providing accessible documentation and solutions for cybersecurity challenges.

A quick reference guide for the VI editor, covering commands and modes.

Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.

A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.

PINNED

Proton Pass Logo

Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.

Data Protection
NordVPN Logo

NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.

Network Security
Mandos Logo

Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Consulting
Checkmarx SCA Logo

Checkmarx SCA

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Application Security
Orca Security Logo

Orca Security

A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

Cloud Security
DryRun Logo

DryRun

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Application Security
CybersecTools logoCybersecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved