Tagged articles
10 articles
Page 1 of 1
Black & White Path
Black & White Path
May 18, 2026 · Industry Insights

Is AI Killing the CTF Scene? An In‑Depth Look at the Decline

The article examines how rapid advances in large language models—from GPT‑4 to Mythos—have automated most CTF challenges, reshaping leaderboards, prompting top teams to quit, and forcing the security community to rethink competition formats, talent assessment, and education.

AICTFClaude Opus
0 likes · 16 min read
Is AI Killing the CTF Scene? An In‑Depth Look at the Decline
Black & White Path
Black & White Path
Feb 21, 2026 · Information Security

Bypassing Linux Pkeys Security Mechanism in a PWN Challenge

An in‑depth analysis of Linux Memory Protection Keys (pkeys), their x86_64 and arm64 implementations, related syscalls, and a step‑by‑step exploit that randomises PKRU permissions and then uses WRPKRU to bypass the restrictions and capture the flag in a CTF PWN challenge.

CTFExploitLinux
0 likes · 12 min read
Bypassing Linux Pkeys Security Mechanism in a PWN Challenge
Architects Research Society
Architects Research Society
Aug 10, 2020 · Information Security

Awesome Penetration Testing Resources and Tools

This article compiles a comprehensive, categorized collection of penetration testing resources—including anonymity tools, antivirus evasion utilities, books, CTF frameworks, Docker containers, network analysis tools, OSINT platforms, and more—providing security professionals and researchers with a valuable reference for offensive security engagements.

CTFDockerOSINT
0 likes · 36 min read
Awesome Penetration Testing Resources and Tools
Architects Research Society
Architects Research Society
Sep 19, 2019 · Information Security

Awesome Penetration Testing Resources and Tools

This comprehensive collection presents a curated list of penetration testing resources—including anonymity tools, antivirus‑evasion utilities, books, CTF frameworks, Docker containers for vulnerable systems, network analysis utilities, OSINT services, reverse‑engineering tools, and security education materials—providing security professionals and researchers with a valuable reference for offensive security testing and learning.

CTFDockerInfoSec
0 likes · 36 min read
Awesome Penetration Testing Resources and Tools
Tencent Cloud Developer
Tencent Cloud Developer
Jun 10, 2019 · Information Security

Third Tencent Information Security Competition (TCTF 2019) Finals Summary and Highlights

After a grueling 30‑hour showdown in Shanghai, the 2019 Tencent Information Security Competition crowned r3kapig as international champion with Balsn and Tea Deliverers trailing, while Fudan’s Whitzard seized the New Star title and a DEF CON berth, highlighting Chinese dominance, cutting‑edge cloud/IoT challenges, live commentary, and Tencent’s role in cultivating cybersecurity talent across universities.

CTFTCTF 2019Tencent
0 likes · 8 min read
Third Tencent Information Security Competition (TCTF 2019) Finals Summary and Highlights
ITPUB
ITPUB
Jul 14, 2016 · Information Security

Essential Guide to Classic Encodings and Ciphers for CTF Challenges

This article provides a comprehensive overview of classic text encodings and simple ciphers frequently encountered in CTF challenges, detailing ASCII, Base64, URL, Unicode, various substitution and transposition ciphers, as well as practical encoding/decoding examples and useful online tools.

CTFciphercryptography
0 likes · 14 min read
Essential Guide to Classic Encodings and Ciphers for CTF Challenges