Welcome to my Capture The Flag (CTF) repository! This repository contains a collection of writeups, challenges, solutions, and assets from various CTF competitions I have participated in. Whether you're looking to learn from my experiences or simply want to explore some interesting challenges, you've come to the right place.
Table of Contents:
Capture The Flag (CTF) competitions are a fun and educational way to practice and improve your cybersecurity and hacking skills. This repository serves as a knowledge base where I share my insights and solutions to the challenges I encountered during CTF competitions. Feel free to use these writeups and assets for learning purposes or to prepare for upcoming CTF events.
The repository is organized into the following directories:
- CTF-Name
- Contains subdirectories for specific CTF competitions.
- Each subdirectory contains writeups, solutions, and assets related to challenges from that CTF.
- README files within each subdirectory provide information about the CTF event and the challenges.
Here's a breakdown of the typical directory structure for a CTF event:
CTF-Name/
│
├── challenges
│ ├── Crypto/
│ │ ├── challenge1/
| │ │ ├── README.md
│ │ │ ├── files/
│ │ │ │ ├── asset1.png
│ │ │ │ └── solve.py
│ ├── Forensics/
│ │ ├── challenge1/
| │ │ ├── README.md
│ │ │ ├── files/
│ │ │ │ ├── asset1.tar.gz
│ │ │ │ └── solve.py
│
└── README.md
You are welcome to use the contents of this repository for your personal learning and reference. Here's how you can make the most of it:
-
Explore Writeups: Browse through the CTF writeups to understand the thought process and techniques used to solve challenges.
-
Download Assets: Download any assets such as scripts, files, or images associated with specific challenges.
This repository is licensed under the MIT License. You are free to use the content here for educational and non-commercial purposes, but please respect any licenses or terms of use associated with third-party assets or tools used in the CTF challenges.