Welcome to the official central repository for Void-Walkers CTF writeups. This archive serves as our collective memory, documenting the vulnerabilities we've exploited, the ciphers we've broken, and the systems we've pwned.
Our writeups are categorized by technical domain. Each folder contains challenge descriptions, scripts, and the step-by-step logic used to capture the flag.
| Category | Description | Index Link |
|---|---|---|
| 🤖 AI | Adversarial ML, model inversion, and LLM jailbreaking. | Index |
| ⛓️ Blockchain | Smart contract auditing and DeFi protocol exploits. | Index |
| ☁️ Cloud Security | AWS/Azure/GCP misconfigurations and container escapes. | Index |
| 🔑 Cryptography | Classic ciphers, RSA/AES attacks, and custom LCGs. | Index |
| 🔍 Digital Forensics | PCAP analysis, memory dumps, and disk artifacts. | Index |
| 💥 Exploitation (PWN) | Binary exploitation, heap grooming, and kernel pwn. | Index |
| 📟 Hardware | Firmware reversing, JTAG/UART, and SDR. | Index |
| 🧩 General Skills | General day to day skills. | Index |
| 🌀 Miscellaneous | Logic puzzles, jail-breaks, and esoteric languages. | Index |
| 📱 Mobile | Hacking into android. | Index |
| 🛰️ OSINT | Geolocation, social engineering, and public data mining. | Index |
| 🛠️ Reverse Engineering | Disassembling ELF/PE binaries and malware analysis. | Index |
| 🖼️ Steganography | LSB encoding, metadata analysis, and hidden streams. | Index |
| 🌐 Web Exploitation | XSS, SQLi, SSRF, and modern web vulnerabilities. | Index |
To maintain the high standard of the Void-Walkers logs, please follow these guidelines when adding a new writeup:
- Naming Convention: Create a sub-folder inside the category using the format
[Year]-[Event]-[ChallengeName]. - The Writeup: Inside your folder, include a
README.mdcontaining:- Challenge Info: Points, difficulty, and original description.
- Solution: A detailed walkthrough (think "how" and "why", not just "what").
- The Flag: Encapsulated in code blocks (e.g.,
void{fl4g_h3r3}).
- Exploits: Include any scripts (
.py,.c,.sh) used to solve the challenge.
If you are a member of the Void-Walkers technical team or staff, ensure your contributions are pushed to a separate branch before merging to main.
"Walking the void between the code and the machine." 🌌
© 2026 Void-Walkers Tech Team.