Offical URL: https://ctf.hxp.io/

A yearly CTF organized by hxp (also known as H4x0rPsch0rr).

See CTF archive: https://ctf.hxp.io/

CTF events

NameWeight
hxp 36C3 CTF0.00
hxp CTF 201863.00
hxp CTF 201742.00
TUM CTF 201628.29
TUM CTF Teaser20.00
Related tags: web pwn xss xtea php crypto stego rop sqli hacking forensics writeup base64 android python pcap xor rsa bruteforce algebra c++ reverse engineering javascript programming engineering aes java brute exploitation misc pwnable re mobile joy exploit stegano ppc pwnables steganography things math sandbox nothing networking injection sonic_visualizer shell cracking bash ssh algorithms windows stuff network padding html network hacking linux recon ida icpc pascal lfi sql injection mysql base32 morse assembly code miscellaneous css reserver none sleeping rev coattail-riding qemu learning kernel visual c++ observation ubifs rdp pkcs12 visual basic analytical thinking clemency exploiting programation variables spectrogram radare2 bof pwning bypass ida pro crc32 beer troll qemuarm baby openvpn pwntools driver iodine dns gdb linearity dos application security secure code review application penetration testing cookies authentication null-byte-poisoning bit-by-bit reversing fmstr fmtstr fortify grabbag docker aws binary analysis usb md5 serialization #sqli pattern-matching #tmnf ssrf ltrace sftp angr elliptic captcha portforwarding pdf cbc #web50 curves capstone totp timing cipher scanner pie sourcecode debian apache2 predictive text inpnut method t9 bamboofox format string xml xmpp local file inclusion ecc mbr cryptanalysis vigenere nx crc cryptography glibc dreaming reverse zip seccomp heap lockpicking pgp 16-bit cap trunct exp bst invert one-time-pad audacity re1 android debug runpe egcd rsa-like fault wget rules polyglot ransomware nginx small-e rootkit acpi symbolic_execution eddsa root ecdlp signedness oob arm32 xxe & svg phar