EditaCTF
RSS FeedGreetings, fellow cyber enthusiasts! Step into the thrilling world of Capture The Flag (CTF) challenges with EditaCTF, where the art of hacking meets the pursuit of knowledge. As the Edita team, we embark on a journey to unravel the mysteries of cybersecurity, sharing our insights, strategies, and victories in the realm of CTFs.
Read the blog posts or check README for more info.
Featured
EditaCTF2025
Published: at 04:55 PMThis write-up covers the solutions to various challenges in the EditaCTF2025 competition, including reverse engineering, cryptography, forensics, and more. Follow the steps, to unravel the mysteries and find the flags for each challenge.
Recent Posts
HacksCTF 2024 Writeups
Published: at 04:55 PMThis write-up covers the solutions to various challenges in the HacksCTF competition, including reverse engineering, cryptography, forensics, and more. Follow the steps, to unravel the mysteries and find the flags for each challenge.
Basics Linux Commands
Published: at 04:55 PMMaster the essentials of Linux commands! From navigating directories to creating and deleting files, these commands are the backbone of CTF challenges. Discover the power of the command line and build essential skills for programming and infosec. Whether you're a beginner or an advanced user, these commands are a must-have in your toolkit.
Cryptography Basics
Published: at 04:55 PMUnlock the secrets of encryption with Cryptography! Delve into the art of coding and decoding messages. Learn how a simple understanding of underlying principles can crack even the most complex encryption schemes. Explore tools like CyberChef, a versatile platform with a graphical user interface, making cryptographic CTF challenges a breeze.
Forensics Basics
Published: at 04:55 PMUncover the digital footprints left by attackers through the fascinating world of Forensics. Explore techniques such as Metadata analysis, File Formats, Steganography, and Networking. Gain insights into blue teaming in cybersecurity, learning to analyze event logs, detect hidden data, and more. Forensics CTF challenges provide a gateway to a broader understanding of cybersecurity.