CTF Write-ups 2013 Logo

CTF Write-ups 2013

0
Free
233
02 Apr 2016
10 September 2025
Visit Website

CTF Write-ups 2013 is a community-driven repository that collects Capture The Flag (CTF) source files and write-ups from competitions that occurred in 2013. The repository serves as an archive where cybersecurity professionals and enthusiasts can access detailed solutions and explanations for various CTF challenges. Contributors can submit their own write-ups through pull requests, making it a collaborative resource for the cybersecurity community. The collection includes source files and documentation that detail how specific CTF challenges were solved, providing educational value for those learning about cybersecurity concepts and techniques. Users can also contribute corrections to existing solutions by submitting pull requests. The repository is part of a larger archive system that spans multiple years, with separate repositories maintained for CTF competitions from 2014, 2015, and 2016. This organizational structure allows users to find write-ups from specific time periods and track the evolution of CTF challenges over time.

FEATURES

SIMILAR TOOLS

A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.

A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.

A comprehensive cheat sheet for using JtR (John the Ripper), a password cracking tool.

A collaborative repository of CTF write-ups and source files from 2014 competitions that allows community contributions to address scattered documentation issues.

A comprehensive guide for computer security incident handling, providing guidelines for establishing incident response capabilities and handling incidents efficiently and effectively.

CTF Writeups are detailed educational documents that explain the step-by-step solutions to Capture The Flag cybersecurity challenges, serving as learning resources for security professionals.

A Microsoft framework for secure and efficient sharing of cybersecurity information between trusted parties to reduce cybersecurity risks.

A centralized repository containing CTF source files and write-ups from 2015 competitions, providing accessible documentation and solutions for cybersecurity challenges.

Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.

PINNED

RoboShadow Logo

A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.

Vulnerability Management
Proton Pass Logo

Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.

Data Protection
NordVPN Logo

NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.

Network Security
Mandos Logo

Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Consulting
CybersecTools logoCybersecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved