This project is a Capture The Flag (CTF) platform built using Python and Flask. It includes various challenges such as Cryptography, Web Exploitation, Reverse Engineering, Forensics, and Steganography.
- User authentication and session management
- Multiple CTF challenges
- Leaderboard to track team scores
- Secure flag submission system
-
Clone the repository:
git clone https://github.com/DefinetlyNotAI/Scrapyard_Bounty.git cd ctf-platform
-
Create a virtual environment and activate it:
python -m venv venv source venv/bin/activate # On Windows use `venv\Scripts\activate`
-
Install the required packages:
pip install -r requirements.txt
-
Run the Flask application:
python CTF.py
-
Open your web browser and navigate to
http://127.0.0.1:5000
.
- Cryptography: Decrypt a ROT13-encrypted message to uncover the flag.
- Web Exploitation: Bypass the login page using SQL Injection to discover the flag.
- Reverse Engineering: Analyze a binary file to find a hardcoded key.
- Forensics: Analyze a PCAP file in Wireshark to find a hidden key.
- Steganography: Extract hidden data from an image file using an automated script.
Contributions are welcome! Please fork the repository and submit a pull request.
This project is licensed under the MIT License.