This repository contains write-ups for various CTF (Capture The Flag) challenges. CTFs are cybersecurity competitions where participants solve security-related puzzles and hacking challenges to find 'flags' and score points. These write-ups document solutions, techniques, and lessons learned from each challenge.
Table of Contents
- Write-ups are organized by platform (e.g., TryHackMe, NSA Codebreaker, EWU CYBR 412), then by CTF or challenge name.
- Each folder contains relevant documentation, screenshots, and solution files for that challenge.
- Images and supporting files are grouped in their respective directories for clarity.
- Nmap, Gobuster, Nikto, and other enumeration tools
- Exploit suggesters, privilege escalation scripts
- Linux command-line utilities
- SQL, reverse engineering, and binary exploitation
- Web application testing and CTF-specific scripts
All content in this repository is for educational purposes only. Do not use any information or techniques described here for unauthorized or malicious activities. Always practice responsible disclosure and follow the rules of any CTF or platform you participate in.
This project is licensed under the MIT License.