Convert Figma logo to code with AI

ctfs logowrite-ups-2014

Wiki-like CTF write-ups repository, maintained by the community. 2014

1,833
649
1,833
17

Top Related Projects

A curated list of CTF frameworks, libraries, resources and softwares

Wiki-like CTF write-ups repository, maintained by the community. 2015

Wiki-like CTF write-ups repository, maintained by the community. 2016

Wiki-like CTF write-ups repository, maintained by the community. 2017

Quick Overview

The ctfs/write-ups-2014 repository is a collection of write-ups for various Capture The Flag (CTF) challenges from the year 2014. It serves as a comprehensive resource for cybersecurity enthusiasts, providing detailed explanations and solutions for a wide range of CTF competitions held during that year.

Pros

  • Extensive collection of write-ups from numerous CTF events in 2014
  • Well-organized structure, categorized by individual CTF competitions
  • Valuable learning resource for both beginners and experienced CTF participants
  • Collaborative effort with contributions from multiple authors

Cons

  • Limited to CTF events from 2014, potentially outdated for current competitions
  • Varying quality and detail level of write-ups depending on contributors
  • May lack context or background information for some challenges
  • No standardized format across all write-ups, which can affect consistency

Note: As this is not a code library, the code example and quick start sections have been omitted as per the instructions.

Competitor Comparisons

A curated list of CTF frameworks, libraries, resources and softwares

Pros of awesome-ctf

  • Comprehensive resource list covering various CTF topics and tools
  • Well-organized structure with clear categories
  • Regularly updated with community contributions

Cons of awesome-ctf

  • Lacks specific CTF challenge write-ups
  • May be overwhelming for beginners due to the extensive list of resources

Code comparison

Not applicable for these repositories, as they primarily consist of markdown files and don't contain significant code samples.

Key differences

write-ups-2014:

  • Focuses on detailed write-ups for specific CTF challenges from 2014
  • Provides step-by-step solutions and explanations
  • Organized by individual CTF events

awesome-ctf:

  • Curated list of tools, resources, and learning materials for CTF participants
  • Covers a wide range of topics including cryptography, forensics, and web exploitation
  • Includes links to practice platforms and CTF event listings

Use cases

write-ups-2014:

  • Ideal for those looking to learn from past CTF challenges
  • Useful for understanding specific techniques used in 2014 CTFs

awesome-ctf:

  • Great starting point for newcomers to CTF competitions
  • Valuable resource for experienced participants looking for new tools and learning materials
  • Helps in preparing for various types of CTF challenges

Wiki-like CTF write-ups repository, maintained by the community. 2015

Pros of write-ups-2015

  • More comprehensive coverage of CTF events
  • Improved organization and structure of write-ups
  • Increased community contributions and participation

Cons of write-ups-2015

  • Potentially overwhelming amount of information for newcomers
  • Some write-ups may lack detailed explanations or context

Code Comparison

write-ups-2014:

def decrypt(ciphertext, key):
    return ''.join(chr(ord(c) ^ key) for c in ciphertext)

write-ups-2015:

def decrypt(ciphertext, key):
    plaintext = ""
    for i in range(len(ciphertext)):
        plaintext += chr(ord(ciphertext[i]) ^ ord(key[i % len(key)]))
    return plaintext

The code in write-ups-2015 shows a more advanced decryption function that uses a repeating key, whereas the write-ups-2014 version uses a single-byte XOR operation. This demonstrates the progression in complexity and sophistication of challenges and solutions between the two years.

Both repositories serve as valuable resources for CTF participants, offering insights into various challenges and solution techniques. The write-ups-2015 repository builds upon the foundation laid by its predecessor, providing a more extensive collection of write-ups and reflecting the evolving nature of CTF competitions.

Wiki-like CTF write-ups repository, maintained by the community. 2016

Pros of write-ups-2016

  • More recent and up-to-date CTF challenges and solutions
  • Larger community contribution due to increased popularity of CTFs
  • Improved organization and structure of write-ups

Cons of write-ups-2016

  • Potentially overwhelming amount of information for beginners
  • Some older, classic challenges may not be included
  • Possibly less detailed explanations in some write-ups due to time constraints

Code Comparison

write-ups-2014:

def decrypt(ciphertext, key):
    plaintext = ""
    for i in range(len(ciphertext)):
        plaintext += chr(ord(ciphertext[i]) ^ ord(key[i % len(key)]))
    return plaintext

write-ups-2016:

from Crypto.Cipher import AES
def decrypt(ciphertext, key):
    cipher = AES.new(key, AES.MODE_ECB)
    return cipher.decrypt(ciphertext)

The code comparison shows a shift from simple XOR-based encryption in 2014 to more advanced cryptographic libraries like AES in 2016, reflecting the increasing complexity of CTF challenges over time.

Wiki-like CTF write-ups repository, maintained by the community. 2017

Pros of write-ups-2017

  • More recent and up-to-date CTF challenges and solutions
  • Larger community contribution due to increased popularity of CTFs
  • Improved organization and structure of write-ups

Cons of write-ups-2017

  • Potentially overwhelming amount of information for beginners
  • Some older, classic challenges may not be included
  • Possibly less detailed explanations in some write-ups due to time constraints

Code Comparison

write-ups-2014:

def decrypt(ciphertext, key):
    plaintext = ""
    for i in range(len(ciphertext)):
        plaintext += chr(ord(ciphertext[i]) ^ ord(key[i % len(key)]))
    return plaintext

write-ups-2017:

from Crypto.Cipher import AES
from Crypto.Util.Padding import unpad

def decrypt(ciphertext, key):
    cipher = AES.new(key, AES.MODE_ECB)
    return unpad(cipher.decrypt(ciphertext), AES.block_size)

The code comparison shows an evolution in cryptographic techniques used in CTF challenges. The 2014 example uses a simple XOR cipher, while the 2017 example employs the more advanced AES encryption algorithm, reflecting the increased complexity of modern CTF challenges.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

CTF write-ups 2014

There are some problems with CTF write-ups in general:

  • they’re scattered across the interwebs
  • they don’t usually include the original files needed to solve the challenge
  • some of them are incomplete or skip ‘obvious’ parts of the explanation, and are therefore not as helpful for newcomers
  • often they disappear when the owner forgets to renew their domain or shuts down their blog

This repository aims to solve those problems.

It’s a collection of CTF source files and write-ups that anyone can contribute to. Did you just publish a CTF write-up? Let us know, and we’ll add a link to your post — or just add the link yourself and submit a pull request. Spot an issue with a solution? Correct it, and send a pull request.

Contributing

Please read CONTRIBUTING.md.

Archive