A CTF that challenges you from web exploitation to reverse engineering ELF binaries.
- netcat
- gnu-netcat
- nc6
- openbsd-netcat (discouraged)
- python
- pwntools
- http request mitm
- burpsuite
- tamper chrome
- debugger
- gdb
- pwndbg
- peda
- radare2
- gdb
- reverse engineering platform
- radare2
- cutter
- binaryninja
- ida/ida pro
- ghidra
- No sharing of flags or solutions. The entire point of a CTF is to learn, so simply handing someone a solution won't benefit them.
- No attacking the scoreboard.
- No brute forcing. All challenges can be done without DDoSing or bruteforcing flags. If there is any need to run a binary a million times, it will work on your own system.
- No DoSing. If you intentionally hold the challenges of the platform down, you will be banned.
Challenge | Points | Port |
---|---|---|
Anti-RE | ??? | None |
Departed | 500 | None |
Challenge | Points | Port |
---|---|---|
Baby Bof | 50 | 9000 |
Custom Canary | 500 | 9100 |
BYOD | 500 | 9800 |
Hotrod | 500 | 9900 |
Challenge | Points | Port |
---|---|---|
PivotPlaneHinge | 500 | 6000 |
Woops | 500 | 6100 |
Graphed | 500 | 6200 |
Challenge | Points | Port |
---|
Challenge | Points | Port |
---|---|---|
Vexed | ??? | None |