A collaborative repository containing CTF source files and write-ups from 2014 competitions. The repository addresses common issues with scattered and incomplete CTF documentation by providing a centralized location for solutions and explanations. Contributors can submit write-ups for various CTF challenges, helping to preserve knowledge and techniques used in capture-the-flag competitions. The platform allows community members to correct issues, improve existing content, and submit pull requests to enhance the overall quality of the documentation. The repository serves as a reference resource for security professionals and students studying CTF methodologies and problem-solving approaches.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A structured approach to managing and responding to suspected security events or incidents.
A collection of detailed CTF challenge writeups organized by category, providing explanations of problems and their solutions for educational purposes.
A behavior-based malware detection system for Android platforms that uses crowdsourcing to detect anomalies and malware in applications.
A quick reference guide for the VI editor, covering commands and modes.
A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.
A repository containing writeups and solutions from various Capture The Flag cybersecurity competitions spanning from 2015 to 2021.
CTF Writeups are detailed educational documents that explain the step-by-step solutions to Capture The Flag cybersecurity challenges, serving as learning resources for security professionals.
A collection of CTF writeups from various competitions including picoCTF, GLUG, TUCTF, and HackTheBox challenges, providing detailed solutions and explanations for cybersecurity competition problems.
A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.