CTF Writeups is a collection of documentation and solutions from various Capture The Flag (CTF) cybersecurity competitions participated in from 2015 to 2021. The repository contains writeups from multiple CTF events including: - dCTF 2021 - Hack-A-Sat Qualifier 2020 - 36C3 Junior CTF 2019 - 35C3 Junior CTF 2018 - AlexCTF 2017 - Multiple 2016 competitions (ABCTF, Boston Key Party, EasyCTF, HSCTF, LASA CTF, Nuit du Hack, Neo CTF, Internet Wache CTF) - 2015 competitions (420blaze SCTF and various challenges) The project maintains consistency standards through Travis CI integration to ensure writeups follow established formatting guidelines. The repository serves as a learning resource documenting approaches, techniques, and solutions used in competitive cybersecurity challenges. The content is distributed under multiple open-source licenses including Beerware, Unlicense, and WTF licenses, with specific license application varying by file.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A community-maintained archive of CTF write-ups and source files from cybersecurity competitions held in 2013.
CTF Writeups are detailed educational documents that explain the step-by-step solutions to Capture The Flag cybersecurity challenges, serving as learning resources for security professionals.
A comprehensive guide for computer security incident handling, providing guidelines for establishing incident response capabilities and handling incidents efficiently and effectively.
A structured approach to managing and responding to suspected security events or incidents.
A centralized repository containing CTF source files and write-ups from 2015 competitions, providing accessible documentation and solutions for cybersecurity challenges.
A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.
A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.
A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.
Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.