This repository contains structured writeups for Capture The Flag (CTF) challenges across multiple domains, including Web Exploitation, Cryptography, Binary Exploitation, and Digital Forensics. Designed to document methodologies, tools used, and reasoning behind each solution
A collection of Capture The Flag (CTF) challenge writeups from beginner to advanced across categories like Web, Crypto, Pwn, Reverse Engineering, Forensics, Osint, boot2root and Misc.
- ๐ Web Exploitation
- ๐งฎ Cryptography
- ๐ง Reverse Engineering
- ๐ Binary Exploitation (Pwn)
- ๐งพ Forensics
- ๐ต๏ธโโ๏ธ OSINT
- ๐งฉ Miscellaneous
Each writeup includes:
- Step-by-step walkthroughs
- Payloads, scripts, and commands used
- Lessons learned and tips
- Optional: screenshots, references, and external resources
๐ค Contributions
Feel free to open issues or pull requests to discuss techniques, add notes, or improve the writeups.
๐ง Disclaimer
All content is for educational purposes only. Do not use the techniques described here for unauthorized activity.
This repo serves as:
- ๐ A personal knowledge base
- ๐ A learning resource for beginners and enthusiasts
- ๐ A reference for solving similar challenges in the future