A platform for jeopardy CTF (capture-the-flag) competitions written in Django.
CTF cybersecurity competitions have become an increasingly popular form of challenges for aspiring cybersecurity students.
After the success of high-school CTF games like picoCTF, we, the members of Montgomery Blair High School's Cybersecurity Club, decided to run our own CTF competition called angstromCTF.
angstromCTF consists of questions ranging from trivial to extremely difficult in various categories:
- Binary exploitation
- Reverse engineering
- Web exploitation
- Master challenges
Using this platform, participants will login, read and answer challenges, learn about cybersecurity, and receive updates. Participants can create and join teams to solve challenges together. The platform is designed to be extensible and re-usable for other CTFs and competitions. If you make something cool with djangoctf, be sure to let us know! For installation instructions, see the Wiki.
This platform is actively maintained by Noah Singer (firstname.lastname@example.org), as well as other members of the project, including Anthony Li (email@example.com), Artemis Tosini (firstname.lastname@example.org), and Chris Wang (email@example.com). The djangoctf and angstromCTF projects are based out of Montgomery Blair High School in Silver Spring, Maryland, USA.
If you would like to contribute to djangoctf, fork this repo and then open a pull request once you're finished. We'll review the code and if it's good, we'll accept it!
This project is licensed under the GNU General Public License (GPL), version 3.