🏳️
The CTF Recipes
  • Introduction
  • Cryptography
    • Introduction
    • General knowledge
      • Encoding
        • Character encoding
          • ASCII
          • Unicode
          • UTF-8
        • Data encoding
          • Base16
          • Base32
          • Base64
      • Maths
        • Modular arithmetic
          • Greatest Common Divisor
          • Fermat's little theorem
          • Quadratic residues
          • Tonelli-Shanks
          • Chinese Remainder Theorem
          • Modular binomial
      • Padding
        • PKCS#7
    • Misc
      • XOR
    • Mono-alphabetic substitution
      • Index of coincidence
      • frequency analysis
      • Well known algorithms
        • πŸ”΄Scytale
        • πŸ”΄ROT
        • πŸ”΄Polybe
        • πŸ”΄Vigenere
        • πŸ”΄Pigpen cipher
        • πŸ”΄Affine cipher
    • Symmetric Cryptography
      • AES
        • Block Encryption procedure
          • Byte Substitution
          • Shift Row
          • Mix Column
          • Add Key
          • Key Expansion / Key Schedule
        • Mode of Operation
          • ECB
            • Block shuffling
              • Challenge example
            • ECB Oracle
              • Challenge example
          • CBC
            • Bit flipping
              • Challenge example
            • Padding oracle
              • Challenge example
          • OFB
            • Key stream reconstruction
            • Encrypt to Uncrypt
  • πŸ› οΈPwn
    • General knowledge
      • STACK
        • Variables storage
        • Stack frame
      • PLT and GOT
      • HEAP
        • HEAP operations
        • Chunk
        • Bins
        • Chunk allocation and reallocation
      • Syscall
    • Architectures
      • aarch32
        • Registers
        • Instruction set
        • Calling convention
      • aarch64
        • Registers
        • Instruction set
        • Calling convention
      • mips32
        • Registers
        • Instruction set
        • Calling convention
      • mips64
        • Registers
        • Instruction set
        • Calling convention
      • x86 / x64
        • Registers
        • Instruction set
        • Calling convention
    • Stack exploitation
      • Stack Buffer Overflow
        • Dangerous functions
          • gets
          • memcpy
          • sprintf
          • strcat
          • strcpy
        • Basics
          • Challenge example
        • Instruction pointer Overwrite
          • Challenge example
        • De Bruijn Sequences
        • Stack reading
          • Challenge example
      • Format string
        • Dangerous functions
          • printf
          • fprintf
        • Placeholder
        • Data Leak
          • Challenge example
        • Data modification
          • Challenge example
      • Arbitrary code execution
        • Shellcode
        • ret2reg
        • Code reuse attack
          • Ret2plt
          • Ret2dlresolve
          • GOT Overwrite
          • Ret2LibC
          • Leaking LibC
          • Ret2csu
          • Return Oriented Programming - ROP
          • Sigreturn Oriented Programming - SROP
          • Blind Return Oriented Programming - BROP
            • Challenge example
          • πŸ”΄Call Oriented Programming - COP
          • πŸ”΄Jump Oriented Programming - JOP
          • One gadget
        • Stack pivoting
    • πŸ› οΈHeap exploitation
      • Heap overflow
        • Challenge example
      • Use after free
        • Challenge example
      • πŸ› οΈDouble free
      • πŸ”΄Unlink exploit
    • Protections
      • Stack Canaries
      • No eXecute
      • PIE
      • ASLR
      • RELRO
    • Integer overflow
Powered by GitBook
On this page

Introduction

NextIntroduction

Last updated 7 months ago

This project is aimed at providing technical guides on various CTF topics:

  • Cryptography

  • Forensic

  • OSINT

  • PWN (60% done)

  • Reverse

  • Steganography

  • Web

  • ...

Cheatsheets are huge resources, but they sometimes lack simplicity or on the contrary they don't give any context or explanation. This is not a cheatsheets project. Everything here will be verified, tested, and not only copy-pasted from I don't know where.

Keep in mind that these guides are maintained by non-omniscient security enthusiasts in their spare time. You will probably find things missing or mistakes and writing all this takes time.

πŸ“£Please feel free to contribute, give feedback/suggestions or reach out to me on Twitter () or Discord (Aku#4254)

🟑
πŸ”΄
πŸ”΄
🟑
πŸ”΄
πŸ”΄
πŸ”΄
@Akumarachi