A collection of CTF challenges I have made over the years.
category/
└── challenge-name/
├── public/ # Files that participants would receive
├── src/ # Files that are deployed to the server / source code to generate the challenge
├── writeup/ # A short writeup/payload and scripts to solve the challenge, if any
└── README.md # Contains the challenge description, flag and any other information
If the challenge needs a service, the challenge can be deployed locally using Docker and Docker Compose using the following commands:
docker-compose up -d
Challenge Name | Topics |
---|---|
forensics-bleu-de-fender | Disk Forensics, Windows Defender, PNG Steganography |
forensics-industrialspy | Memory Forensics, Volatility3, GIMP |
forensics-industrialspy2 | Wireshark, USB Forensics |
forensics-industrialspy3 | Network Forensics, Wireshark, Threat Intelligence |
forensics-loss | Git Forensics, Git Recovery |
forensics-power | Network Forensics, Threat Intelligence, PowerShell |
forensics-protokol | Network Forensics |
Challenge Name | Topics |
---|---|
web-belajar-coding | PHP, LFI |
web-copasbin | XSS, Prototype Pollution, CVE |
web-greet-your-friend | SSTI, Jinja2 |
web-joewatson | JWT, Nginx Misconfiguration, LFI |
web-pink | Command Injection |
web-siakgg | SQL Injection |
web-thematrix | Cypher Injection, Neo4j |
Challenge Name | Topics |
---|---|
misc-grassyfields | Morse Code |
misc-napi | Python Jail, Privilege Escalation |
Challenge Name | Topics | |
---|---|---|
reverse-hackedlol | Reverse Engineering | Python Bytecode, Obfuscation |