{"id":19702144,"url":"https://github.com/dipsas/dctf-2023","last_synced_at":"2025-11-22T05:02:58.467Z","repository":{"id":211456086,"uuid":"729184188","full_name":"DIPSAS/DCTF-2023","owner":"DIPSAS","description":"Beginner-friendly CTF cybersecurity contest held during the 2023 d:Hack hackathon","archived":false,"fork":false,"pushed_at":"2023-12-08T16:04:55.000Z","size":12747,"stargazers_count":0,"open_issues_count":0,"forks_count":1,"subscribers_count":0,"default_branch":"main","last_synced_at":"2025-02-27T16:18:34.352Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"C","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/DIPSAS.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2023-12-08T15:58:17.000Z","updated_at":"2023-12-08T16:03:09.000Z","dependencies_parsed_at":"2023-12-08T17:35:06.813Z","dependency_job_id":null,"html_url":"https://github.com/DIPSAS/DCTF-2023","commit_stats":null,"previous_names":["dipsas/dctf-2023"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/DIPSAS/DCTF-2023","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DIPSAS%2FDCTF-2023","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DIPSAS%2FDCTF-2023/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DIPSAS%2FDCTF-2023/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DIPSAS%2FDCTF-2023/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/DIPSAS","download_url":"https://codeload.github.com/DIPSAS/DCTF-2023/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DIPSAS%2FDCTF-2023/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":285737153,"owners_count":27223129,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-11-22T02:00:05.934Z","response_time":64,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-11-11T21:13:37.994Z","updated_at":"2025-11-22T05:02:58.439Z","avatar_url":"https://github.com/DIPSAS.png","language":"C","readme":"# d:CTF 2023\n\n![d:CTF Logo](dctflogo.png)\n\nThe CTF competition arranged for the d:hack 2023 hackathon at DIPS AS.\n\nChallenges designed by [@raymonshansen](https://github.com/raymonshansen/), [@olivernilssen](https://github.com/olivernilssen), [@orjanj](https://github.com/orjanj) and [@jaalu](https://github.com/jaalu).\n\n## Setup\n\nIf you have Docker Compose installed, you can run the challenges yourself by cloning the project and running `docker-compose up` in the root directory.\n\nNote that *Next Generation Calculator* is commented out as it is very resource-intensive.\n\n## Challenge types\n\nChallenges are divided into five categories:\n\n* *Crypto*: challenges about cryptography and code breaking\n* *Investigation*: challenges about reverse-engineering secrets and data from files and programs\n    * This category covers both *reverse-engineering* and *forensics* categories in other CTFs\n* *Pwn*: challenges about discovering and exploiting vulnerabilities\n* *Misc*: challenges about creative problem solving\n* *Web*: challenges about exploiting vulnerabilities in web applications\n\n## Useful tools \n\n### Windows utilities\n\n* [Windows Sandbox](https://learn.microsoft.com/en-us/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview) lets you set up disposable Windows environments quickly - nice if you only need a tool for a specific challenge!\n* [Windows Subsystem for Linux](https://learn.microsoft.com/en-us/windows/wsl/install) lets you set up a Linux environment as part of your Windows installation.\n\n### Programming\n\n* If you're new to programming, [Python](https://www.python.org/) is a nice scripting language with lots of resources available.\n    * [Automate the Boring Stuff](https://automatetheboringstuff.com/) is a good practical guide to Python\n* Some challenges may require the [.NET SDK](https://dotnet.microsoft.com/en-us/download/visual-studio-sdks)\n\n### Cryptography\n\n* [CyberChef](https://gchq.github.io/CyberChef/) - a Swiss army knife of cryptography, which offers encryption, decryption and general file analysis tools\n* [DCode](https://www.dcode.fr/en) - handy utilities for analyzing and breaking classical ciphers \n\n### Investigation/Reverse engineering\n\n* [GHIDRA](https://ghidra-sre.org/) - a full software reverse engineering suite, offering disassembly, decompilation, and graphing\n* [IDA Free](https://hex-rays.com/ida-free/) - the free version of the established reverse-engineering and debugging toolkit, also offers a decompiler\n* [dnSpy](https://github.com/dnSpy/dnSpy) - .NET assembly decompiler and editor\n* [dotPeek](https://www.jetbrains.com/decompiler/) - JetBrains' .NET decompiler\n* [Binwalk](https://github.com/ReFirmLabs/binwalk/wiki/Quick-Start-Guide) - file analysis tool\n\n### Web\n\n* The browser *developer tools* -- accessible with the shortcut \u003ckbd\u003eF12\u003c/kbd\u003e in [Firefox](https://developer.mozilla.org/en-US/docs/Learn/Common_questions/Tools_and_setup/What_are_browser_developer_tools) and [Chromium-based browsers](https://developer.chrome.com/docs/devtools/open/) \n* [Postman](https://www.postman.com/) - lets you craft your own HTTP requests to web apps\n* [Fiddler](https://www.telerik.com/download/fiddler) - lets you observe traffic to and from your computer\n\n### Pwn\n\n* [Burp Suite](https://portswigger.net/burp/communitydownload) - toolkit to map and exploit vulnerabilities in web applications\n* [Pwntools](https://docs.pwntools.com/en/stable/) - a Python library with utilities for networking, exploit development and common CTF tasks\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdipsas%2Fdctf-2023","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdipsas%2Fdctf-2023","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdipsas%2Fdctf-2023/lists"}