Skip to content

CTF Writeups & Solutions

Welcome to my personal archive of Capture The Flag (CTF) challenges that I've solved across different competitions.
This site contains detailed writeups, exploit scripts, and technical notes documenting how each problem was approached, analyzed, and solved.

Learn cybersecurity techniques including web exploitation (XSS, SSRF, SQL injection, CRLF injection, CSP bypass), binary exploitation (buffer overflow, ROP chains), cryptography (CRC algorithms, hash collisions), steganography (APNG analysis, PCAP analysis), and various miscellaneous challenges.


Competitions

Use the sidebar navigation to browse writeups by competition:

2025


Categories

Web Exploitation

SQL injection, XSS, SSRF, CSP bypass, CRLF injection, authentication bypass, prototype pollution

Binary Exploitation (Pwn)

Buffer overflow, ROP chains, function pointer hijacking, libc leaks

Cryptography

CRC algorithms, hash collisions, linear algebra over GF(2)

Steganography

APNG analysis, PCAP forensics, hidden data extraction

Miscellaneous

Docker registry enumeration, Git history analysis, Linux privilege escalation, Ruby regex exploitation


Disclaimer

All materials are provided for educational and research purposes only.
Use responsibly and respect CTF competition rules.

License

This project is licensed under the MIT License.