Collection of writeups and solutions from various Capture The Flag competitions by the Deriv Security Team.
The Deriv Security Team is dedicated to advancing cybersecurity knowledge through active participation in Capture The Flag (CTF) competitions worldwide. Our team specializes in various security domains including web exploitation, binary exploitation, cryptography, reverse engineering, and forensics.
We believe in knowledge sharing and contributing to the security community. This repository serves as a comprehensive collection of our CTF solutions, methodologies, and insights gained from competing in various cybersecurity challenges.
Our Mission: To continuously improve our security skills, share knowledge with the community, and contribute to making the digital world more secure.
ctf-writeups/
├── 2025/
│ ├── CyberQ-CTF/ # CyberQ Hackathon 2025
│ ├── Dubai-Police-CTF/ # Dubai Police CTF 2025
│ └── [Other CTFs]
├── 2024/
│ └── [CTF competitions from 2024]
└── ...
Website: https://cyberq.ctf.ae/ | Dates: Oct 20-21, 2025 (Qualifiers), Nov 26-27, 2025 (Finals) | Location: Online + ADNEC, Abu Dhabi | Prize Pool: AED 100,000
The ultimate challenge in cybersecurity featuring next-gen cryptography, post-quantum algorithms, and AI vulnerabilities. Organized by Technology Innovation Institute (TII) & Cyber Security Council (CSC).
Website: https://dp.ctf.ae/ | Dates: October 2025 | Location: Dubai, UAE
Dubai Police Cybersecurity CTF competition featuring challenges in web exploitation, binary exploitation, cryptography, and reverse engineering.
Website: https://ctf.hackthebox.com/event/details/hack-the-boo-2025-competition-2842 | Dates: October 24-27, 2025 | Platform: HackTheBox
Annual Halloween-themed CTF competition featuring challenges across cryptography, binary exploitation, reverse engineering, forensics, web security, and coding challenges.
Each writeup in this repository includes:
- Challenge Description: Detailed overview of the challenge and objectives
- Analysis: In-depth technical analysis of vulnerabilities and attack vectors
- Solution Approach: Step-by-step methodology used to solve the challenge
- Exploit Code: Working proof-of-concept code and scripts
- Key Learnings: Important techniques, tools, and insights gained
This repository is maintained by the Deriv Security Team. We welcome feedback, suggestions, and discussions about our writeups.
- Organization: Deriv Security
- Repository: https://github.com/deriv-security/ctf-writeups
- Website: https://deriv.com
Disclaimer: All writeups are published after CTF competitions have concluded and are intended for educational purposes only.