Legoclones / created-ctf-challengesLinks
A compilation of CTF problems I've created for various CTFs
☆26Updated 2 months ago
Alternatives and similar repositories for created-ctf-challenges
Users that are interested in created-ctf-challenges are comparing it to the libraries listed below
Sorting:
- ☆97Updated 10 months ago
- HackTheBox Academy Modules writeups and notes☆26Updated last year
- TryHackMe rooms, tips and tricks, and other CTF writeups☆134Updated 4 months ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆68Updated 3 years ago
- INE Training Notes☆51Updated 9 months ago
- Damn Vulnerable API☆85Updated 3 months ago
- Official writeups for Cyber Apocalypse CTF 2025: Tales from Eldoria☆191Updated 9 months ago
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working o…☆78Updated 2 years ago
- ☆103Updated 3 years ago
- Official writeups for University CTF 2023: Brains & Bytes☆105Updated last year
- improving...☆250Updated 3 months ago
- A composite list of various vulnerabilities and tools to look for and use while exploiting common CTF challenges☆59Updated 2 years ago
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆98Updated last week
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆158Updated last month
- All Solutions☆189Updated last year
- Write-ups / walkthroughs of 'boot to root' Capture The Flag (CTF) challenges☆53Updated 3 years ago
- 0xbro's cheatsheets and CTFs notes☆86Updated 2 weeks ago
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆108Updated 3 years ago
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆217Updated last year
- Hi, guys. In this repo, i'll be posting resources related to different categories of CTF challenges.☆32Updated 2 months ago
- Official writeups for Hack The Boo CTF 2024☆54Updated last year
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆412Updated last year
- A comprehensive, step-by-step penetration testing checklist for ethical hackers. Covers pre-engagement, information gathering, analysis, …☆116Updated last year
- My notes while studying for the PNPT from TCM Security.☆82Updated last year
- tryhame rooms walkthrough☆47Updated 2 weeks ago
- Templates for submissions☆94Updated 5 months ago
- ☆199Updated 3 months ago
- Common CTF Challenges is a collection of tools and resources to help individuals improve their Capture the Flag (CTF) skills. Cover a wid…☆131Updated last month
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tran☆14Updated 2 years ago
- All About CTFs☆262Updated 2 years ago