Welcome to the AzCTF Challenge Repository! This repository contains a variety of Capture The Flag (CTF) challenges across multiple categories, designed to test and improve your skills in cybersecurity, reverse engineering, cryptography, forensics, OSINT, steganography, and web security.
This CTF was proudly introduced during the Az-SENCS Expo for the first time by Az-SENCS 15 Vice-President, Saleh Diaa Ahmed, as part of our initiative to promote hands-on cybersecurity experience within the student community.
Cryptography/ Forensics/ Network/ OSINT/ Steganography/ Web/ tests/
Each main directory contains subfolders for individual challenges.
- Cryptography: Classic and modern crypto puzzles, XOR, AES, and more.
- Forensics: Memory dumps, malware analysis, intrusion events.
- Network: Packet analysis, protocol reverse engineering.
- OSINT: Open-source intelligence and investigation tasks.
- Steganography: Hidden data in images, files, and more.
- Web: Web application security and exploitation.
- Choose a challenge from any category.
- Read the README.md inside the challenge folder for instructions and hints.
- Solve the challenge using your skills and tools.
- Submit the flag in the format:
AzCTF{...}
Cryptography/ Forensics/ Network/ OSINT/ Steganography/ Web/
Cryptography/What is my type/
├── challenge.c
├── challenge # Compiled binary (if applicable)
├── README.md # Challenge description and hints
├── solution.py # (Optional) Solution script
├── temp.txt # (Optional) Notes/hints
- Some challenges include progressive hints in their README or separate hint files.
- Writeups may be provided for learning purposes from the CTF team.
AzCTF is created and maintained by a passionate group of cybersecurity enthusiasts, educators, and CTF players. Our goal is to provide high-quality, educational challenges for learners of all levels.
Core Contributors:
- 0xSA7 -- Founder & Challenge Author
- Hizat -- Deployment & Support
- GERR4Y -- OSINT Challenge Author
- Basmala Osama – Web Challenge Author
We welcome new contributors! If you'd like to join the team or help improve the repository, check out 0xSA7.
All challenges are for educational purposes only. Do not use these techniques on systems you do not own or have explicit permission to test.
Happy hacking! 🚩

