Offical URL: https://ctf.intigriti.io/

Intigriti runs a yearly CTF event called 1337UP LIVE. This capture the flag event will have hackers fighting in teams of up to 6 players in a Jeopardy-style event. The event will run for 36 hours, hosting challenges in the usual categories; web, pwn, rev, crypto, game, mobile, misc, osint etc.

CTF events

NameWeight
1337UP LIVE CTF24.23
1337UP LIVE CTF22.49
Related tags: security pentesting pentest ctf forensics stego python debugging programming exploit network crypto analysis - reverse_engineering pwnable xss bashing hacking sqlinjection exploits scripting developing extraction linux bash siem things shellcode csharp web javascript threat nmap exploitation x86 penetration php trivia unpacking assembly kernel sql dnspy enumeration base64 apache vpn volatility wireshark pcap wireless windows fuzzing user-agent writeups webshell metasploit mysql c++ reversing ollydbg steganography malware oshardening sandbox vernam kali wifi packed puzzle networking ruby mongodb vlan ipsec usb java x64 vm openctf ret2libc binaryexploitation rop c bufferoverflow pwning docker mobile information sleeping c nothing hardware pwn re asm revers python3 scala js 2022 mailman cloud sql-injection java-serialization rce lfi excel reverse bsqli jpg serialization eval clicker game bof format-string rsa sqli nodejs prng oracle cbc csrf unintended-solution heap babypwn misc cryptography-rsa ssrf kubernetes 1337up-live-ctf mobile_reverse gandalf apk ssti jinja2 race condition dnsrebinding officialwriteup discord chatgpt rev wienersattack modular-arithmetic xor rust obfuscation base32 encoding hex morse rar zip binwalk ftp lsb trivial 6502 underflow wiener maze game-hacking pathtraversal unity lua c64 gameboy upx .net z3 obfuscated gamehacking rpgmaker uaf jwt format googling osint exif llm lll redos graphql newline pdf puppeteer 1337rokudenashi