Welcome to jerseyCTF, a repository dedicated to hosting the code used in NJIT's 24-hour hackathon on March 29, 2025. This repository contains challenge implementations, solutions, and infrastructure code for the Capture The Flag (CTF) competition.
jerseyCTF is a cybersecurity hackathon designed to challenge participants with a variety of security-related tasks, including:
- Cryptography
- Reverse Engineering
- Web Exploitation
- Forensics
- Binary Exploitation
- Steganography
jerseyCTF/
│── challenges/
│ ├── crypto/
│ ├── web/
│ ├── forensics/
│ ├── reverse/
│ ├── binary/
│── infrastructure/
│ ├── docker/
│ ├── deployment/
│── solutions/
│ ├── crypto/
│ ├── web/
│ ├── forensics/
│── docs/
│── README.md
│── LICENSE
- challenges/: Contains the challenge problems and necessary files.
- infrastructure/: Scripts, Dockerfiles, and configuration for hosting challenges.
- solutions/: Contains official solutions for the challenges.
- docs/: Event documentation, rules, and setup guides.
To set up and run the challenges locally:
git clone https://github.com/YOUR_USERNAME/jerseyCTF.git
cd jerseyCTFEach challenge directory contains:
- A
README.mdfile explaining the challenge. - The challenge source code and resources.
- A solution file for reference after the event.
This project is licensed under the MIT License. See the LICENSE file for details.