Look for all of them at the CTF Writeups list https://berzerk0.github.io/GitPage/CTF-Writeups/CTF-index.html
The official version is found at https://berzerk0.github.io/GitPage/How-To-Guides/FirstCTF_1of2_InfoAndSetup.html
The official version is found at https://berzerk0.github.io/GitPage/CTF-Writeups/Blue-HTB.html
The official version is found at https://berzerk0.github.io/GitPage/CTF-Writeups/Blocky-HTB.html
The official version is found at https://berzerk0.github.io/GitPage/CTF-Writeups/Europa-HTB.html
The official version is found at https://berzerk0.github.io/GitPage/CTF-Writeups/ZorZ-Vulnhub.html
This is "CTF" is more of a vulnerability sandbox than a true Capture the Flag challenge. However, it is a great way to explore some WebApp Upload vulnerabilities.
The VulnHub description says:
The official version is found at https://berzerk0.github.io/GitPage/CTF-Writeups/Bulldog-Vulnhub-NonIntro.html
A fun box from Vulnhub, written by Nick Frichette. You can find it here at https://www.vulnhub.com/entry/bulldog-1,211/
The official version is found at https://berzerk0.github.io/GitPage/CTF-Writeups/LazySysAdmin-VulnHub.html
A fun box from Vulnhub, written by Togie McDogie. You can find it here at https://www.vulnhub.com/entry/lazysysadmin-1,205/
The official version is found at https://berzerk0.github.io/GitPage/CTF-Writeups/Optimum-HTB.html
This was one of my first capture the flags, and the first HTB to go retired while I had a good enough grasp of it to do a write up. The steps are directed towards beginners, just like the box.
I hereby claim:
- I am berzerk0 on github.
- I am berzerk0 (https://keybase.io/berzerk0) on keybase.
- I have a public key ASCqxLrh-ig_S9XpmFNS_RkrZJgl7SRXe9YwkihVMcPqQAo
To claim this, I am signing this object: