A comprehensive collection of Capture The Flag (CTF) competition writeups spanning multiple years and events. The collection includes detailed solutions and explanations for various CTF challenges from competitions such as picoCTF 2018, GLUG 2018, TUCTF 2018, OtterCTF 2018, xiomara 2019, BsidesSF 2019, Securinets prequal 2019, INShAck-2019, and ISITDTU-2019. The repository contains writeups for over 130 challenges across different CTF events, providing insights into problem-solving approaches and techniques used in cybersecurity competitions. Additionally, it includes writeups for HackTheBox challenges, offering practical examples of penetration testing and vulnerability exploitation scenarios. The writeups are organized by competition and year, making it easy to navigate through different events and challenge types. Each writeup typically includes the challenge description, solution methodology, and step-by-step explanations of the approach taken to solve the problem.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.
A collaborative repository of CTF write-ups and source files from 2014 competitions that allows community contributions to address scattered documentation issues.
CTF Writeups are detailed educational documents that explain the step-by-step solutions to Capture The Flag cybersecurity challenges, serving as learning resources for security professionals.
A collection of detailed CTF challenge writeups organized by category, providing explanations of problems and their solutions for educational purposes.
A comprehensive guide for computer security incident handling, providing guidelines for establishing incident response capabilities and handling incidents efficiently and effectively.
A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.
Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.
A repository containing writeups and solutions from various Capture The Flag cybersecurity competitions spanning from 2015 to 2021.
A collection of CTF challenge write-ups and solutions from the SababaSec cybersecurity team covering competitions from 2019 to 2022.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.