Offical URL: https://ctf.intigriti.io/

Intigriti runs a yearly CTF event called 1337UP LIVE. This capture the flag event will have hackers fighting in teams in a Jeopardy-style event. The event will run for 36 hours, hosting challenges in the usual categories; web, pwn, rev, crypto, game, mobile, misc, osint etc.

CTF events

NameWeight
1337UP LIVE CTF24.23
1337UP LIVE CTF24.23
1337UP LIVE CTF22.49
Related tags: shellcode security pentesting pentest ctf forensics stego python debugging programming exploit network crypto analysis - reverse_engineering pwnable xss bashing hacking sqlinjection exploits scripting developing extraction linux bash siem things csharp web javascript threat nmap exploitation x86 penetration php trivia unpacking assembly kernel sql dnspy enumeration base64 apache vpn volatility wireshark pcap wireless windows fuzzing user-agent writeups webshell metasploit mysql c++ reversing ollydbg steganography malware oshardening sandbox vernam kali wifi packed puzzle networking ruby mongodb vlan ipsec usb java x64 vm openctf engineering reverse russian postgresql ret2libc binaryexploitation rop c bufferoverflow pwning docker mobile information sleeping c nothing hardware pwn re asm revers python3 scala js technologies script just learning math misc 2022 mailman cloud sql-injection java-serialization rce lfi excel bsqli jpg serialization eval clicker game bof format-string rsa sqli nodejs prng oracle cbc csrf unintended-solution heap babypwn jscript x86-64 arm64 shadowstack stack unicorn mmap substitution osint google aws zip huffman-tree deflate jar linkedin verilog primes crt aes-cbc aes-ecb iv ciphertexts brute-force deobfuscation lsb-oracle parity laravel nginx command injection compression template-injection api rng cryptography-rsa ssrf kubernetes 1337up-live-ctf mobile_reverse gandalf apk ssti jinja2 race condition dnsrebinding officialwriteup discord chatgpt rev wienersattack modular-arithmetic xor rust obfuscation base32 encoding hex morse rar binwalk ftp lsb trivial 6502 underflow wiener maze game-hacking pathtraversal unity lua c64 gameboy upx .net z3 obfuscated gamehacking rpgmaker uaf jwt format googling exif llm lll redos graphql newline pdf puppeteer 1337rokudenashi v8 overflow buffer