All Projects → fabacab → CTF

fabacab / CTF

Licence: other
🎏 Capture The Flag (CTF) challenges that I've encountered. An "educational purposes only" repository.

Programming Languages

HTML
75241 projects
PHP
23972 projects - #3 most used programming language
python
139335 projects - #7 most used programming language

Labels

Projects that are alternatives of or similar to CTF

Bscan
an asynchronous target enumeration tool
Stars: ✭ 207 (+1625%)
Mutual labels:  ctf
Ctf Crypto
Contains tools for solving RSA and other crypto problems in CTFs.
Stars: ✭ 221 (+1741.67%)
Mutual labels:  ctf
x86 shellcode tutorial
A training course for BambooFox
Stars: ✭ 27 (+125%)
Mutual labels:  ctf
Ctfnote
CTFNote is a collaborative tool aiming to help CTF teams to organise their work.
Stars: ✭ 213 (+1675%)
Mutual labels:  ctf
N1ctf 2018
Official repository containing files related to N1CTF 2018.
Stars: ✭ 220 (+1733.33%)
Mutual labels:  ctf
Juice Shop Ctf
Capture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (+1883.33%)
Mutual labels:  ctf
Picoctf
The platform used to run picoCTF. A great framework to host any CTF.
Stars: ✭ 203 (+1591.67%)
Mutual labels:  ctf
xeca
PowerShell payload generator
Stars: ✭ 103 (+758.33%)
Mutual labels:  ctf
Mipt Ctf
A small course on CTF (wargames) for beginners [in Russian]
Stars: ✭ 221 (+1741.67%)
Mutual labels:  ctf
My CTF Challenges
🔥☀️
Stars: ✭ 55 (+358.33%)
Mutual labels:  ctf
Ctf All In One
CTF竞赛权威指南
Stars: ✭ 2,807 (+23291.67%)
Mutual labels:  ctf
Shiva
An Ansible playbook to provision a host for penetration testing and CTF challenges
Stars: ✭ 220 (+1733.33%)
Mutual labels:  ctf
MyJWT
A cli for cracking, testing vulnerabilities on Json Web Token(JWT)
Stars: ✭ 92 (+666.67%)
Mutual labels:  ctf
Berserker
A list of useful payloads for Web Application Security and Pentest/CTF
Stars: ✭ 212 (+1666.67%)
Mutual labels:  ctf
noxCTF-2018-PSRF-as-Pwn
No description or website provided.
Stars: ✭ 50 (+316.67%)
Mutual labels:  ctf
Awesome Ctf Cheatsheet
CTF Cheatsheet
Stars: ✭ 204 (+1600%)
Mutual labels:  ctf
Reverse Shell Generator
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Stars: ✭ 238 (+1883.33%)
Mutual labels:  ctf
ctftime.org
meta repository for ctftime.org issues, feature-requests etc
Stars: ✭ 64 (+433.33%)
Mutual labels:  ctf
2020p
WeCTF 2020+ Source Code & Organizer's Writeup
Stars: ✭ 22 (+83.33%)
Mutual labels:  ctf
limbernie.github.io
my security journey
Stars: ✭ 19 (+58.33%)
Mutual labels:  ctf

Capture The Flag (CTF)

Capture The Flag competitions often supply a number of small attachments or puzzle files. This repository is a collection of those assets and associated write-ups describing how to approach the challenge. The aim is to build an archive of challenges that I've personally encountered while playing CTFs with friends or alone, or found elsewhere and used as self-education exercises.

This repository is currently an experiment to figure out how to effectively introduce inexperienced hackers to CTFs and to penetration testing more generally. Unlike many CTF writeups which simply describe how a given participant or team solved a challenge, I aim to include a wealth of supplemental yet relevant background information into my writeups. Similarly, I aim to solve as many challenges as I can manually, i.e., without the aid of popular tools, in order to ensure that I fully understand why a given hack actually works.

This is still a work in progress. I'm not entirely sure how I want to organize this repo or with what voice/format I will be writing the CTF challenge writeups.

Repository structure

🚧 This is a work in progress. Suggestions welcome.

This repository is structured in a manner optimized for learning from CTF writeups. Its directory hierarchy is as follows:

  • Year
    • CTF name/event
      • README.md file containing:
        • CTF format
        • Flag format
        • Source code for challenges, if released
        • Notes, if any
      • Challenge category
        • Challenge name
          • README.md file containing the writeup itself
          • assets/ folder containing any material needed to complete the challenge acquired elsewhere.
          • attachments/ folder containing any downloadable attachments given in the challenge clue.
          • loot/ folder containing any assets acquired from the challenge itself.
          • screenshots/ folder containing any screenshots taken during the challenge and used in the writeup.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].