Skip to content

csecclub/battleground-uta

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

61 Commits
 
 
 
 
 
 

Repository files navigation

CTF Playground

Welcome to the CTF Playground! This repository contains a collection of Capture The Flag (CTF) challenges designed to test various cybersecurity skills. Whether you're a beginner or an experienced enthusiast, you'll find a variety of challenges to hone your skills.

Challenges

Description: Challenges that test basic cybersecurity skills.

2. Swap

Description: Decode and understand the underlying code.

Description: Find vulnerabilities in binary applications.

Description: Analyze digital evidence to solve the challenge.

Description: Find out what's going on with the attached file.

Description: Identify and exploit vulnerabilities in web applications.

Description: Exploit systems via command injection vulnerabilities.

Description: Find hidden information within files.

Description: Test your cryptography skills.

Description: looks like my friend thought using multiple crypto algorithms meant he'd be safer!

Description: These three numbers from my office are suspicious

Description: These three numbers from my office are suspicious

Description: These three numbers from my office are suspicious

Description: Learn about SQL vulnerabilities.

Description: Can you help find my friend?

Description: The police found a leaked photo of the man on the run!

Getting Started

To get started with the CTF Playground, visit the challenge URLs above to begin solving the challenges.

Contributing

Feel free to contribute to the CTF Playground by submitting issues, pull requests, or suggestions. Your contributions help improve the challenges and make the platform better for everyone!

  • Note this project uses vercel and must be installed before contributing

To run dev:

  • npm run start To run build:
  • npm run build

License

This project is licensed under the MIT License - see the LICENSE file for details.

Authors

Acknowledgments

  • Thanks to the UTA cybersecurity community for their invaluable resources and tools.
  • Special thanks to contributors and mentors who have helped shape the challenges.

Enjoy solving the challenges and happy hacking!

Releases

No releases published

Packages

No packages published