xiosec/CTF-writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation


Writeups Challenges I have solved

xiosec - CTF-writeupsstars - CTF-writeupsforks - CTF-writeupsGitHub releaseLicenseissues - CTF-writeups

You can see all the writeups here

  • xiosec - xiosec.github.io
NameTypeDescriptionsWriteup
PreviseMachinePrevise Hackthebox walkthroughRemoved ❌
ToxicWebHumanity has exploited our allies, the dart frogs, for far too long, take back the freedom of our lovely poisonous friends. Malicious input is out of the question when dart frogs meet industrialisation. 🐸Writeup
Emdee five for lifeWebCan you encrypt fast enough?Writeup
FreeLancerWebCan you test how secure my website is? Prove me wrong and capture the flag!Writeup
TemplatedWebCan you exploit this simple mistake?Writeup
Impossible PasswordReversingAre you able to cheat me and get the flag?Writeup
IlluminationForensicsA Junior Developer just switched to a new source control platform. Can you find the secret token?Writeup
PhonebookWebWho is lucky enough to be included in the phonebook?Writeup
baby ninja jinjaWebThe elders of the village summoned you to take the reigns after the recent death of you father. It's time to end the emperor's gruesome tyranny.Writeup
GunshipWebA city of lights, with retrofuturistic 80s peoples, and coffee, and drinks from another world... all the wooing in the world to make you feel more lonely... this ride ends here, with a tribute page of the British synthwave band called Gunship. 🎶Writeup
HancliffeMachineHancliffe Hackthebox walkthroughRemoved ❌
PandoraMachineHackthebox Pandora walkthroughRemoved ❌
ShibbolethMachineHackthebox Shibboleth walkthroughRemoved ❌
NameTypeDescriptionsWriteup
Basic Malware RERoomThis room aims towards helping everyone learn about the basics of “Malware Reverse Engineering”.Writeup
Reversing ELFRoomRoom for beginner Reverse Engineering CTF players.Writeup
Reverse EngineeringRoomThis room focuses on teaching the basics of assembly through reverse engineering.Writeup
BlueMachineDeploy & hack into a Windows machine, leveraging common misconfigurations issues.Writeup
OWASP Top 10RoomLearn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.Writeup
Nmap RoomRoomAn in depth look at scanning with Nmap, a powerful network scanning tool.Writeup
The find commandRoomA learn-by-doing approach to the find command.Writeup
Disk Analysis & AutopsyForensicReady for a challenge? Use Autopsy to investigate artifacts from a disk image.Writeup
InternalCTFPenetration Testing ChallengeWriteup
Lumberjack TurtleCTFNo logs, no crime... so says the lumberjack.Writeup
Brainpan 1CTFReverse engineer a Windows executable, find a buffer overflow and exploit it on a Linux machine.Writeup
NameFormatDescriptionsWriteup
picoCTF 2022JeopardypicoCTF 2022 is an annual capture-the-flag (CTF) hacking competition where participants gain access to a safe and unique hands on experience.Writeup
CyberApocalypseCTF2022JeopardyA super villain named Draeger escaped from a maximum security prison, formed his own evil squad, and convinced the Intergalactic Federal Government to work for him! You are a group of misfits that came together under unlikely circumstances, each with their own hacking “superpowers” and past with Draeger…Writeup
Lexington Informatics Tournament CTF 2022JeopardyLexington Informatics Tournament CTF 2022 is a Jeopardy-style, beginner-friendly online CTF that's open to everyone. It is hosted by the LexMACS club from Lexington High School.Writeup
NameTypeDescriptionsWriteup
Inj3ction TimeWebI stumbled upon this website: http://web.ctflearn.com/web8/ and I think they have the flag in their somewhere. UNION might be a helpful commandWriteup
Calculat3 M3WebHere! http://web.ctflearn.com/web7/ I forget how we were doing those calculations, but something tells me it was pretty insecure.Writeup

Released under MIT by @xiosec.