Back to writeups

CTFlogs

About CTFlogs

A practical cybersecurity writeup archive for CTF players, students and ethical hackers — one searchable place for writeups, methodology notes and challenge walkthroughs.

Who We Are

CTFlogs is a focused archive for cybersecurity learning, practical CTF solving and ethical hacking research. We collect writeups, methodology notes and challenge walkthroughs in one searchable place.

The goal is simple: make security learning easier to revisit, compare and apply. Each writeup preserves the reasoning behind the solve — not just the final command.

What You'll Find

  • CTF Writeups — detailed solutions to challenges from HackTheBox, TryHackMe, PicoCTF, OSCP labs and more
  • Methodology Notes — structured approaches to common vulnerability classes and pentesting phases
  • Tool References — quick command references for nmap, gobuster, burpsuite, sqlmap, ffuf and more
  • Category Tags — browse by Web, Crypto, Forensics, Reversing, Pwn, OSINT, Misc and more

Why CTFlogs

Security writeups are scattered across personal blogs, GitHub repos, Discord servers and pastebin snippets. CTFlogs brings them into a single, searchable and consistently formatted archive — built for the way hackers actually learn: by reading how someone else solved the same problem.

Every writeup on CTFlogs is written to capture the thought process, not just the answer. Understanding why an exploit works matters more than copy-pasting the payload.

Who This Is For

  • CTF players looking for hints, post-solve comparisons or technique references
  • Students building practical skills through hands-on ethical hacking examples
  • Professionals maintaining structured methodology, tooling notes and technique libraries
  • Researchers tracking attack patterns and techniques across challenge categories

Got a correction or want to contribute? Use the contact page.