CTF Writeups are detailed explanations of the steps taken to solve challenges in Capture The Flag competitions, providing insights into the thought process and techniques used by cybersecurity professionals.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive collection of resources for learning ARM assembly language and shellcode development.
An open convention/conference discussing computer security, privacy, and information technology
A tool for scraping CTF writeups from ctftime.org and organizing them for easy access.
A tool for SSH server & client configuration auditing with comprehensive analysis and policy scans.
Repository for IBM SOAR Apps source-code and development resources.
Script to verify audit settings for Microsoft Defender for Endpoint in GPO.
Leading academic department offering diverse courses and research opportunities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.