CSC: Difference between revisions
Jump to navigation
Jump to search
(Created page with "This page collects useful information from and for participants to the Cyber Security Challenge, and in general for any similar CTF exercises * Types of problems * Useful tools") |
No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
This page collects useful information from and for participants to the Cyber Security Challenge, and in general for any similar CTF exercises | This page collects useful information from and for participants to the Cyber Security Challenge, and in general for any similar CTF exercises | ||
== Types of problems == | |||
== Useful tools == | |||
* Audacity | |||
* gdb | |||
* Python / Ruby | |||
* Volability (http://www.volatilityfoundation.org) |
Latest revision as of 20:23, 9 March 2018
This page collects useful information from and for participants to the Cyber Security Challenge, and in general for any similar CTF exercises
Types of problems
Useful tools
- Audacity
- gdb
- Python / Ruby
- Volability (http://www.volatilityfoundation.org)