Offical URL: https://www.isss.io/utctf/

Online, jeopardy-style CTF run by the Information & Systems Security Society at the University of Texas at Austin. Free to play, with prizes offered to University teams. Open to all! Problems will span difficulties ranging from beginner-friendly to extremely challenging. Run by the hhh? CTF Team, with members from the Information & Systems Security Society. More information: - Logo: https://imgur.com/rC9nuxo - List of sponsors: https://www.isss.io/ - ISSS (organization): https://www.isss.io/

no logo

CTF events

NameWeight
UTCTF 202134.11
UTCTF 202024.85
UTCTF 201924.85
Related tags: web pwn xss php trivia crypto stego sqli hacking forensics android perl python mips pcap rsa penetration testing bruteforce algebra c++ reverse engineering forensic logic unicode metasploit javascript programming c engineering security aes java go exploitation misc otp pwnable re sql stegano ppc admin steganography things photoshop coding nothing networking ruby prng injection terminal_characters steg cracking code, escape pentest bash funsignals no$gmb algorithms windows hmac format-string stuff network sqlinj string html linux all recon wireshark noth tetris side-channel sqlinjection lfi assembly language burpsuite networks pyjail image learning new things assembly code css password malware analysis rev gameboy got plt qemu sstv csharp learning nmap tshark backdoor kernel x86-64 beginner crackme maths enumeration binwalk scapy hash radare2 stegno git network security bof bufferoverflow binaryexploitation java programing brop pwning x86_64 powershell foren macintosh linuxbasic flask google shellcode overflow malloc ret2dlresolve srop deobfuscation sqlmap decryption wireless attacks burp dns ophcrack nessus cloud revesing machine off-by-one quantum algorithm null-byte-poisoning osint aes-cbc diffie-hellman x64 asm x86 asm stack_overflow a200ks mom regex reversing reverse_engineering ropchain use-after-free cryptography-rsa jit strings 2017 ethical hacking logs shellcoding server troubleshooting ansible aws binary analysis md5 stackcanary buffer encryption ret2libc angr password-cracking programming.algorithm statistics applications animation infoleak uaf coppersmith ecc wireless crypt rtl-sdr graphs hexeditor c cryptography command_injection reverse ecb binaryninja scanf virtualization protocols reconaissance zip heap powerpc audacity group theory proxy cookie emulator aeg aes-ecb development scanning fastbin fastbindup doublefree libc_database one_gadget brainfuck korea csp-bypass vtable sse smb shamir 8-bit keylogger jni obfuscation tcache python-exploitation binary-exploitation ftp neural ssl-traffic-decryption pit sagemath python2 lc4 am-modulation pyinstaller ping general_skills machine_learning welcome wasm arbitrary-read file_structure xxe emoji calloc mmaped tcache-poisoning tcache-dup fake_chunk reverse-engineering rubic adversarial machinelearning arbitrary-write spectre aes-gcm rng traversal zajebiste forenciss gnuradio webassembly io_file babytcache unsorted_bin specture 2020 utctf utc forenc n0named quic qsstv machine-learning binary-exploitaion primes rf windows pwn shadow stack bypassing mitigations reverse-proxy firefox-history jsshell red-herring