Welcome to the CTF Writeups Repository! This repository contains detailed solutions and explanations for Capture The Flag (CTF) challenges across various categories and competitions. Our goal is to document strategies and techniques for learning and reference.
The repository is organized as follows:
CTF-Writeups/
├── Competition-Name/
│ ├── Category/
│ │ ├── challenge-name.md
CTF-Writeups/
├── IrisCTF-2025/
│ ├── Web/
│ │ ├── bad-todo.md
This repository is designed to:
- Educate and Inform: Provide insights into solving various types of CTF challenges.
- Document Techniques: Preserve methods for exploitation, debugging, and problem-solving.
- Support Collaboration: Share strategies with the cybersecurity community.
We encourage contributions to expand this repository! If you’d like to contribute:
- Fork the repository.
- Follow the directory structure described above.
- Submit a pull request with your writeup and any associated files.
For detailed guidelines, check our CONTRIBUTING.md.
- Web Exploitation
- Cryptography
- Reverse Engineering
- Forensics
- Binary Exploitation (Pwn)
- Miscellaneous
Special thanks to all contributors and the wider cybersecurity community for their support and inspiration in solving these challenges.
All writeups are for educational purposes only. Please use the knowledge responsibly and adhere to ethical hacking practices.
Explore, learn, and contribute to the exciting world of Capture The Flag challenges!