KITCTF

We like to hack things, all the things.
Toots and typos by @95p
and @intrigus

2025-12-26

Pleasant surprise to see our mascot being used in @c3awareness's communication as header picture :)
(events.ccc.de/en/2025/12/18/aw)

The KITCTF mascot on a table at 38c3.
2025-12-04

Check out the writeup for "Pls respond" from last weekend's @lakectf by @prionbreaker, Benedikt and n0rdan if you ever wanted to learn about formats used in SMS messages and what the hell Wireless Vector Graphic (WVG) are :P
kitctf.de/writeups/lakectf-pls

2025-12-02

Our “getting started talk series” is coming to a close!
This Thursday Timon will conclude it with his talk about cryptography.
7pm **-101**, 50.34

2025-11-26

Next stop for our intro series this Thursday:
An introduction to binary exploitation/pwning by @Ordoviz.
7pm -101, 50.34

2025-11-24

We got third place at @LosFuzzys Glacier CTF 🎉
Thank you for organizing and the IDA Pro license :D

Place 	Team 	Score
1 	.;,;. 	7821
2 	Platypwnies 	6825
3 	KITCTF 	5828
4 	TU Delft CTF Team 	5334
5 	WROng_flag 	5332
6 	h4tum 	4970
7 	Ganesh 	4884
8 	Lil L3ak 	4404
9 	Squid Proxy Lovers 	4390
10 	Shellphish 	4179
2025-11-18

After a week of web exploitation, it is time to descend to the binary level and add reverse engineering into the mix.
@MisterPine will get you started with his talk on Thursday, 7 pm in the KIT CS building (50.34), room -101.

2025-11-18

We had a lot of fun playing Platypwn 2025 last weekend and achieved 6th place 🎉
Thank you for hosting a CTF with such a nice variety of different categories and until next time!

Scoreboard
Rank	Points	Team	# of Flags Solved
#1	14164	WE_0WN_Y0U 	36
#2	11201	h4tum 	33
#3	11169	Pwn-la-Chapelle 	33
#4	9291	Ynov Cyber Crew 	31
#5	8514	ENOFLAG 	30
#6	8349	KITCTF It's you	30
#7	7347	CyberTaskForce Zero 	26
#8	7058	NuttyShell 	27
#9	6505	Lil L3ak 	28
#10	6380	Phish Paprikas 	26
2025-11-11

Talks will be held in german. We can likely answer questions and provide support in english afterwards, if required.

2025-11-11

Want to get into CTFs? Our series of talks and challenges is a great opportunity to do that. Come by every Thursday at 7 pm in the KIT CS building (50.34), room -101. We will start with an intro into CTFs and web hacking on the 13th of November.
More info: kitctf.de/intro/

2025-11-06

This Thursday, Benedikt will talk about funny DSP architectures, Binja plugins 🥷 and what to look out for when using the Binary Ninja API.
As always: 7pm -120, 50.34

2025-10-02

We arrived in Mexico City for @googlevrp's #hackceler8 finals together with @fluxfingers 🥳

Flag-squirrel with cat ears and a KITCTF vest on the left. On the right, RGB cat ears.
2025-09-25

Another Thursday, another Hackceler8 topic: tooling and a map demo this time.
As always, 7pm -120, 50.34

2025-09-17

This Thursday, we'll be talking about Hackceler8 and how to corrupt memory with rust 🥳
As always, 7pm -120, 50.34

2025-09-10

This Thursday, we'll be talking about Hackceler8:
What are the details, what do we need for success, and how you can help us 🙂
As always, 7pm -120, 50.34

2025-09-08

We won 2nd on-site place at @enoflag @nullcon Berlin CTF last week 🥳🥳🥳

Organizers and winners of the CTF in front of the scoreboard.
2025-08-10

Help, our mascot is attacking @organizers infrastructure at DEF CON CTF 🧐

Flag-squirrel in front of a locked laptop that appears to run Debian.
It's trying to log into the "organizers" account.
2025-08-10

Our mascot says hi to @defcon 33 🥳

Flag-squirrel in front of the defcon 33 logo.
2025-07-30

This Thursday, we're excited to have @oiio talk about Android system services and how to use @fridadotre for efficient and scalable IPC request interception.
As always, 7pm -120, 50.34

2025-07-01

We've just published our report on flag sharing during GPN CTF 2025!

Sadly, we had to investigate 53 incidents of flag sharing which was possible because we used dynamic, team-specific flags.

Read the full breakdown of our findings and methodology: kitctf.de/gpnctf-23/gpn-ctf-fl

#GPN23 #ctf

An adaption of the four panel gru meme (https://knowyourmeme.com/memes/grus-plan)
Frame #1: Build dynamic flags
Frame #2: detect cheating in your ctf
Frame #3: 53 hits
Frame #4: 53 hits

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst