guides
how to approach ctf challenges.
category-specific guides for beginners and intermediate ctf players.
CTF Guide for Beginners
What CTFs are, how challenges are structured, practice platforms, and how to approach your first challenge.
How to Approach Web CTF Challenges
Recon methodology, common vulnerability classes, useful tools, and how to think about web exploitation in a CTF context.
Crypto CTF Guide
Classical ciphers vs. modern crypto, common RSA attack patterns, useful tools, and how to read a crypto challenge.
Pwn CTF Guide
checksec, stack overflows, ROP chains, format string exploitation, heap attacks, and pwntools scripting.
Forensics CTF Guide
File identification, steganography, PCAP analysis, Volatility memory forensics, file carving, and metadata extraction.
Reverse Engineering CTF Guide
Static and dynamic analysis, Ghidra decompilation, anti-debug bypass, crackme logic, and symbolic execution.
OSINT CTF Guide
Geolocation, username enumeration, reverse image search, domain research, and social media investigation.
Misc CTF Guide
Jail escapes, encoding puzzles, programming challenges, game exploitation, and how to identify the actual challenge type.