A public archive of CTF (Capture The Flag) challenges and writeups that I have participated in and solved.
This repository serves as a centralized collection of my CTF solutions, writeups, and related materials from various cybersecurity competitions. The goal is to document my learning journey, share knowledge with the community, and provide reference materials for common CTF challenge patterns.
The repository is organized by CTF event and challenge category. Each challenge typically includes:
- Challenge description
- Solution approach and methodology
- Exploit code or scripts
- Writeup documentation
- Any relevant files or resources
Some CTF writeups that I've participated in are available on my blog:
Common CTF categories that may be covered include:
- Web Exploitation
- Binary Exploitation / Pwn
- Reverse Engineering
- Cryptography
- Forensics
- Miscellaneous
Feel free to browse through the challenges and solutions. Each directory should contain sufficient information to understand the challenge and the approach taken to solve it.
While this is primarily a personal archive, if you find any errors or have suggestions for improvements, feel free to open an issue or submit a pull request.
These solutions are provided for educational purposes only. Please respect CTF rules and only use these techniques in authorized environments.
See the LICENSE file for details.