Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/0x4m4/bloodcodectf
Blood Code CTF challenge repository! This repository contains all the challenges and their source files from the Capture The Flag event codenamed "Blood Code," organized by 0x4m4. It includes challenges in cryptography, steganography, digital forensics, pwn, pyjail, reverse engineering, and web exploitation, designed for all skill levels.
https://github.com/0x4m4/bloodcodectf
0x4m4 bloodcode capture-the-flag cryptography ctf-challenges digital-forensics hackathon pwn pyjail reverse-engineering sir-syed-case-institute-of-technology sscaseit sscit steganography web-exploitation
Last synced: 8 days ago
JSON representation
Blood Code CTF challenge repository! This repository contains all the challenges and their source files from the Capture The Flag event codenamed "Blood Code," organized by 0x4m4. It includes challenges in cryptography, steganography, digital forensics, pwn, pyjail, reverse engineering, and web exploitation, designed for all skill levels.
- Host: GitHub
- URL: https://github.com/0x4m4/bloodcodectf
- Owner: 0x4m4
- Created: 2024-06-30T17:36:33.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2024-06-30T17:40:34.000Z (5 months ago)
- Last Synced: 2024-07-05T14:01:13.354Z (4 months ago)
- Topics: 0x4m4, bloodcode, capture-the-flag, cryptography, ctf-challenges, digital-forensics, hackathon, pwn, pyjail, reverse-engineering, sir-syed-case-institute-of-technology, sscaseit, sscit, steganography, web-exploitation
- Language: C++
- Homepage: https://ctf.0x4m4.com/
- Size: 71.1 MB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Blood Code CTF Challenges
Welcome to the Blood Code CTF challenge repository! This repository contains all the challenges and their source files from the Capture The Flag event codenamed "Blood Code." This event was organized by the Sir Syed CASE Institute of Technology Cyber Security Society, with the main technical sponsor being 0x4m4.
![Alt text](/ctf.0x4m4.com.jpg)
## Event Overview
**Event Name:** Blood Code CTF
**Organized By:** Sir Syed CASE Institute of Technology Cyber Security Society
**Main Technical Sponsor:** 0x4m4
**Platform:** ctf.0x4m4.comThe Blood Code CTF was designed to test participants' skills in various domains of cybersecurity, including reverse engineering, pwn, pyjail, web exploitation, digital forensics, and OSINT. The challenges varied in difficulty from basic to hard, catering to a wide range of skill levels.
## Challenge Categories
1. **Cryptography and Steganography**
- **Binary_Shadows**
- **Burning_Inside**
- **Encrypted_Echoes**
- **Hidden_Message**
- **Possession**
- **Scrambled_Secrets**2. **Digital Forensics**
- **Bitwise_Mystery**
- **Flag**
- **Fragmented_Forensics**
- **Osama's_Obscured_Secrets**
- **Secrets_in_the_Shadow**3. **Pwn**
- **BabyROP**
- **ReadMe**4. **Pyjail**
- **FreeMe**5. **Reverse Engineering**
- **Feed_Me**
- **Forgot_Password**
- **LPC**6. **Web Exploitation**
- **1024_Redirects**
- **CASE_Money_Transfer**
- **Cookie**
- **Reload**
- **Source_of_all_Problems**
## Repository Structure
The repository is organized into directories based on challenge categories. Each challenge directory contains the source files and a README file with detailed instructions and solutions.
```
.
├── Cryptography_Steganography
│ ├── Binary_Shadows
│ ├── Burning_Inside
│ ├── Encrypted_Echoes
│ ├── Hidden_Message
│ ├── Possession
│ └── Scrambled_Secrets
├── Digital_Forensics
│ ├── Bitwise_Mystery
│ ├── Flag
│ ├── Fragmented_Forensics
│ ├── Osama's_Obscured_Secrets
│ └── Secrets_in_the_Shadow
├── Pwn
│ ├── BabyROP (has docker file included)
│ └── ReadMe (has docker file included)
├── Pyjail
│ └── FreeMe
├── Reverse_Engineering
│ ├── Feed_Me
│ ├── Forgot_Password
│ └── LPC (has docker file included)
└── Web
├── 1024_Redirects
├── CASE_Money_Transfer
├── Cookie
├── Reload
├── Source_of_all_Problems
└── docker-compose.yml (to start all web challs locally)
```## How to Use
1. **Clone the Repository:**
```
git clone https://github.com/0x4m4/BloodCodeCTF.git
```2. **Navigate to the Desired Challenge:**
```
cd BloodCodeCTF/Challenge_Category/Challenge_Name
```3. **Follow the Instructions:** Each challenge directory contains a README file with specific instructions and necessary files. You can drop me a mail or text me on discord if you want solution or having any issue.
## Contribution
Feel free to contribute to this repository by submitting pull requests for improvements, additional challenges, or solutions. All contributions are welcome and appreciated.
## Contact
For any queries or issues, please contact me at [email protected]
Happy Hacking!
![Alt text](/Challenges.jpg)
![Alt text](/Challenges1.jpg)
![Alt text](/Challenges2.jpg)---
0x4m4
Blood Code CTF