Various security CTF challenges written by kuilin. All of them are hard, some exceptionally hard.
I'm hosting some of them for you to try right now! Check out https://ctf.kuilin.net to see deployed challenges, and sign up to get credit for your solves and check flags.
This repo only has public challenge data, no solutions or spoilers. See the write-ups or ask me for solutions.
Name | Public Release | Short Non-Spoilers Description | Solved/Teams | Write-ups |
---|---|---|---|---|
wasmcloud | 2021-07-30 in UIUCTF 2021 |
Break a web service that runs your webassembly on the server |
0*/1069 | 1 |
pow_erful | 2021-07-30 in UIUCTF 2021 |
Cheat a sha256 proof of work | 16/1069 | 1 |
Who is GDB? | 2020-07-17 in UIUCTF 2020 |
Break a GDB server (...server?) | 2/882 | None‡ |
cricket32 | 2020-07-17 in UIUCTF 2020 |
Strangely short x86 reversing, now with 100% less angr-ability |
11/882 | 1, 2, 3 |
ouroboros | 2020-02-04 in sigpwny CTF† |
Strangely short x86 reversing | N/A | None |
trapezoid | 2019-08-15 in sigpwny CTF† |
LC-3 assembly reversing | N/A | None |
discordctf | 2019-04-18 for sigpwny CTF† |
30 Discord minutiae challenges | N/A | None |
*wasmcloud had zero solves by the end of the event, and was only first solved 18 hours after the event ended by the write-up author.
‡Who is GDB? was the only challenge in UIUCTF 2020 that did not get any write-ups.
†sigpwny CTF is a private internal CTF for sigpwny that was long-running and generally had no write-ups.