Welcome to CTF Playbooks! This repository is a collaborative space for sharing Capture The Flag (CTF) playbooks across various categories. Whether you're a seasoned CTF player or just getting started, feel free to contribute your playbooks and browse others' submissions to learn and improve your skills.
- Fork the Repository: Start by forking this repository to your GitHub account.
- Create a New Branch: Create a new branch on your forked repository where you'll make your changes.
- Add Your Playbook: Create a new Markdown file (.md) for your playbook in the relevant category folder. If the category doesn't exist, feel free to create it.
- Write Your Playbook: In your Markdown file, provide a detailed explanation of your CTF solution, including the challenges faced and the steps taken to solve them. You can also include any code snippets, tools used, or diagrams to enhance clarity.
- Submit a Pull Request: Once you're done writing your playbook, submit a pull request to have it reviewed and merged into the main repository.
- Web Exploitation
- Reverse Engineering
- Blockchain
- Hardware
- Binary Exploitation
- Cryptography
- Forensics
- Pwn
- Miscellaneous
Feel free to suggest additional categories if you believe they're necessary.
This repository is licensed under the MIT License. By contributing to this project, you agree to abide by the terms outlined in the license.
If you have any questions, suggestions, or feedback, don't hesitate to open an issue or reach out to the maintainers.
Let's collaborate and build a comprehensive collection of CTF playbooks to empower and inspire fellow cybersecurity enthusiasts!