About
Team creation: April 2020, our first official CTF was WPI CTF 2020.
We were born after the CyberChallenge.it training program, and all of our team members participated to this program, in different editions, at the Napoli venue.
Many team members started playing CTF before the date they joined the team and before the date reported on their CTFTime profile.
Members of the team:
- Colui77, from team creation, active, professor.
- Ve, from team creation, active, captain.
- Shotokhan, from team creation, active.
- Tiugi, from team creation, active.
- GiangiHACK27, from team creation, active.
- zGenny, from team creation, active.
- s1m0n3_, from team creation, active.
- Kraef, from October 2020, active.
- ErPaciocco, from October 2020, active.
- d1l3mm4, from October 2020 to July 2023, former member.
- gSpera, from July 2021, active.
- zP3P, from July 2021 to July 2023, former member.
- _vX, from July 2021 to July 2023, former member.
- SirFrigo, from July 2022, active.
- 0xMatte, from July 2022, active.
- AleDecre, from July 2022, active.
- Dralute, from July 2022, active.
- daloski, from July 2022, active.
- LL3006, from July 2022, active.
basilefr
, from July 2023, active.Frollo
, from July 2023, active.
Our team on CTFTime: link
Our projects:
- Exploit manager for A/D CTF, with a web-based editor for exploits and real-time management of exploit threads;
- Traffic remote capture, indexing & analysis tool for A/D CTF, with a web interface, low dependencies (only install tcpdump on the vulnerable machine!) and an high degree of configurability;
- Attack/Defense gameserver for local team training, very easy to deploy, configure and to write checkers for the services, it also has an easy, tested and documented architecture, so it’s easy to extend (there is also a full demo with a vulnerable service);
- Utils for Suricata automation: provides a cheatsheet and some scripts for Suricata to automatize installation, management, configuration and an util to help with the rules’ creation;
- Implementation of CVE-2022-0847 as a shellcode;
- A heap overflow challenge;
- A web security challenge, aimed at scripting with requests;
- WAF written in python, that is simple & self-contained;
- Another exploit manager;
- CTF proxy for A/D CTF.