https://github.com/ret2hell/uoftctf
Write up of solutions to the UofTCTF 2024 capture the flag (CTF) event from my submissions during the competition.
https://github.com/ret2hell/uoftctf
binary-exploitation ctf ctf-writeups
Last synced: 8 months ago
JSON representation
Write up of solutions to the UofTCTF 2024 capture the flag (CTF) event from my submissions during the competition.
- Host: GitHub
- URL: https://github.com/ret2hell/uoftctf
- Owner: Ret2Hell
- Created: 2024-01-15T19:00:50.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2024-01-15T23:16:17.000Z (almost 2 years ago)
- Last Synced: 2024-01-17T05:37:30.842Z (almost 2 years ago)
- Topics: binary-exploitation, ctf, ctf-writeups
- Language: Python
- Homepage:
- Size: 20.5 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# UofTCTF 2024
## Overview ##
I participated in the [UofTCTF](https://play.uoftctf.org) 2024 competition as an individual competing in the Binary exploitation category, organised by University of Toronto, which ran from Jan 13 2024 to Jan 14 2024(a 24-hour CTF).
This is a write up of the challenges solved during the event.
## Challenges ##
**This event write up is a work in progress.**
Binary Exploitation (3 solutions)
* **[basic-overflow](basic-overflow/basic-overflow.md) (Solved)**
* **[baby-shellcode](baby-shellcode/baby-shellcode.md) (Solved)**
* **[patched-shell](patched-shell/patched-shell.md) (Solved)**
Full solutions to the challenges are provided in the write ups.