Offical URL:

Online, jeopardy-style CTF run by the Information & Systems Security Society at the University of Texas at Austin. Free to play, with prizes offered to University teams. Open to all! Problems will span difficulties ranging from beginner-friendly to extremely challenging. Run by the hhh? CTF Team, with members from the Information & Systems Security Society. More information: - Logo: - List of sponsors: - ISSS (organization):

no logo

CTF events

UTCTF 202134.11
UTCTF 202024.85
UTCTF 201924.85
Related tags: web pwn xss php trivia crypto stego sqli forensics android perl python pcap rsa penetration testing bruteforce algebra c++ reverse engineering logic unicode javascript programming c engineering aes java exploitation misc otp pwnable re sql stegano ppc steganography things photoshop coding nothing networking ruby prng injection terminal_characters steg cracking code, escape bash funsignals no$gmb algorithms format-string stuff network sqlinj html linux all wireshark sqlinjection lfi assembly language networks pyjail learning new things assembly code css malware analysis rev gameboy got plt qemu sstv learning tshark backdoor kernel beginner crackme maths binwalk scapy hash radare2 stegno git network security bof binaryexploitation java programing brop pwning foren macintosh linuxbasic google overflow deobfuscation decryption wireless attacks burp dns ophcrack nessus cloud machine quantum osint diffie-hellman x64 asm x86 asm a200ks mom regex reversing reverse_engineering ropchain strings 2017 logs shellcoding binary analysis md5 buffer password-cracking statistics applications animation ecc crypt c cryptography reverse ecb binaryninja virtualization reconaissance zip heap powerpc audacity group theory emulator aes-ecb libc_database brainfuck korea csp-bypass sse shamir 8-bit keylogger jni obfuscation tcache python-exploitation binary-exploitation neural ssl-traffic-decryption pit sagemath python2 lc4 pyinstaller ping general_skills machine_learning welcome wasm xxe reverse-engineering rubic adversarial machinelearning spectre aes-gcm zajebiste forenciss webassembly io_file babytcache unsorted_bin specture 2020 utctf utc forenc n0named quic qsstv binary-exploitaion windows pwn shadow stack bypassing mitigations reverse-proxy