Welcome to my PicoCTF writeup repository. This project is a personal collection of solutions and detailed explanations for the challenges I encountered during PicoCTF. The purpose of this repository is to document my learning process and share insights with others on their cybersecurity journey.
This repository covers challenges from the following categories:
- Web Exploitation: Exploiting vulnerabilities in web applications.
- Cryptography: Breaking or implementing cryptographic algorithms.
- Reverse Engineering: Understanding and analyzing binaries to reverse their behaviour.
- Forensics: Recovering and analyzing digital traces.
- General Skills: Testing fundamental cybersecurity and computer science knowledge.
- Binary Exploitation: Exploiting vulnerabilities in binary applications.
- Navigate through the categories to find specific challenge writeups.
- Each writeup includes:
- The challenge description.
- Step-by-step solution.
- Tools or techniques used.
- Explanation or additional insights.
This repository is licensed under the MIT License. Feel free to use and share, but kindly credit this repository.