Things we learned from Capture The Flag hacking competitions we participated in. CTFs We Participated In * 2021 dCTF * 2020 Hack-A-Sat Qualifier * 2019 36C3 Junior CTF * 2018 35C3 Junior CTF * 2017 AlexCTF * 2016 ABCTF * 2016 Boston Key Party * 2016 EasyCTF * 2016 HSCTF * 2016 LASA CTF * 2016 Repo of Challenges * 2016 Nuit du Hack * 2016 Neo CTF * 2016 Internet Wache CTF * 2015 420blaze SCTF * 2015 Repo of challenges Build Status We use Travis CI to ensure write-ups follow consistency standards. Last build status: Licences We use a combination of the Beerware, Unlicense, and WTF licenses. Which license applies to what file, we'll let you figure out. ;)
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.
A comprehensive guide to Nessus, a vulnerability scanner, covering data directories, binary directories, logs directories, plugin directories, advanced settings, API, and good practices.
A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.