Welcome to my CTF Writeups repository! Here, I document the solutions and methodologies used to solve various Capture The Flag (CTF) challenges. This repository is intended to serve as a learning resource for others interested in cybersecurity and CTF competitions.
Capture The Flag (CTF) competitions are a popular way to practice and improve cybersecurity skills. These competitions present various challenges that require problem-solving, creativity, and technical knowledge. This repository contains my writeups for different CTF challenges I have participated in.
Here is a list of the writeups included in this repository:
- Agent Sudo
- Anonymous
- Basic Pentesting
- Blogger1
- Bounty Hacker
- Colddbox THM
- Colddbox Vulnhub
- Easy peasy
- IDE
- Lazy Admin
- Photographer
- Mr Robot
- RickdiculouslyEasy 1
- Raven 1
- Toolsrus
- Zeek Exercises
- Masterminds
- Warzone 1
- Warzone 2
- Carnage
- TShark
- TShark Challenge 1: Teamwork
- Tshark Challenge II: Directory
- ItsyBitsy
- Investigating with Splunk
- Benign
- SlingShot
- Conti
- PS Eclipse
- New Hire Old Artifacts
- Boogeyman 3
- Monday Monitor
- Retracted
- Unattended
- Disgruntled
- Secret Recipe
- Critical
- Tempest
- Boogeyman 2
- Ramnit
- Reveal
- FakeGPT
- Brave
- Redline
- Memory Analysis
- Lockbit
- WinRar 0-Day
- Boogeyman 1
- PacketDetective
- DanaBot
- Web Investigation
- WebStrike
- PoisonedCredentials
- TomCat Takeover
- PsExec Hunt
Each writeup contains a detailed explanation of the challenge, the steps taken to solve it, and the tools used.
The challenges covered in this repository span various categories, including:
- Web Exploitation
- Brute-forcing
- Network Scanning and Enumeration
- Privilege Escalation
- Steganography
- SMB Enumeration and Exploitation
Some of the tools frequently used in these writeups include: