A collection of my writeups for PicoCTF challenges, documenting methodologies, tools, and solutions across various cybersecurity categories.
Welcome to my PicoCTF writeup repository! This collection showcases detailed solutions and methodologies for challenges Iβve solved in the PicoCTF platform. The aim is to document my learning journey in cybersecurity through practical problem-solving and knowledge sharing.
The challenges are organized by category:
π Web Exploitation
π Reverse Engineering
π Binary Exploitation
π Forensics
π Cryptography
π General Skills
Each folder contains:
- The challenge description (if allowed)
- The solution approach and reasoning
- The final exploit or script
- Flag (redacted or encoded)
PicoCTF is one of the best platforms to sharpen your CTF and infosec skills. It offers beginner-to-intermediate challenges that simulate real-world scenarios in a gamified environment.
By solving and documenting these challenges, I aim to:
- Enhance my problem-solving and cybersecurity skills
- Prepare for Capture The Flag (CTF) competitions and internships
- Help others learn from my approaches
- Python, Bash, and C
- Ghidra, Radare2, and IDA Free
- Burp Suite, Postman
- Wireshark, binwalk, strings, and stegsolve
- Common Linux utilities (
grep
,nc
,curl
, etc.)
- Writeups are for educational purposes only.
- All flags (if shown) are redacted or encoded.
- Some writeups may contain alternate or multiple solutions.
If you spot any improvements or have questions, feel free to open an issue or a pull request. Collaboration and learning go hand in hand!
This repository is licensed under the MIT License. See LICENSE for details.
Happy Hacking π