Description: A comprehensive collection of Capture The Flag (CTF) challenge write-ups covering various cybersecurity categories such as web exploitation, cryptography, reverse engineering, binary exploitation, forensics, and more. This repository serves as a personal and community resource to document challenge-solving methodologies, tools used, and lessons learned from CTF competitions and platforms.
This repository contains detailed solutions and walkthroughs from multiple CTF events, organised by year, event, and challenge category. Each write-up provides step-by-step explanations, code snippets, screenshots, and flags where applicable, aimed at helping beginners and experienced security enthusiasts improve their skills.
writeupCTF/
│
├── web/ # Web exploitation challenges
│ ├── challenge1.md
│ ├── challenge2.md
│ └── ...
│
├── crypto/ # Cryptography puzzles and challenges
│ ├── challenge1.md
│ ├── challenge2.md
│ └── ...
│
├── pwn/ # Binary exploitation and reverse engineering
│ ├── challenge1.md
│ ├── challenge2.md
│ └── ...
│
├── forensics/ # Forensic analysis challenges
│ ├── challenge1.md
│ └── ...
│
├── misc/ # Miscellaneous or Uncategorized challenges
│ ├── challenge1.md
│ └── ...
│
├── tools/ # Useful tools, scripts, or automation code
│ ├── script1.py
│ └── ...
│
├── images/ # Screenshots and media files related to challenges
│
└── README.md # Overview and usage instructions
Contributions are welcome! Please follow the existing structure and formatting guidelines. Add new write-ups in Markdown, include relevant screenshots, and describe your approach clearly.
For questions or collaboration, feel free to open an issue or reach out through gmail.
This repository is licensed under the MIT License - see the LICENSE file for details.