Science Score: 44.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
    Found CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
    Found .zenodo.json file
  • DOI references
  • Academic publication links
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (7.2%) to scientific vocabulary
Last synced: 6 months ago · JSON representation ·

Repository

Basic Info
  • Host: GitHub
  • Owner: Alexreb04
  • License: wtfpl
  • Language: TeX
  • Default Branch: main
  • Size: 4.16 MB
Statistics
  • Stars: 1
  • Watchers: 1
  • Forks: 0
  • Open Issues: 0
  • Releases: 1
Created 12 months ago · Last pushed 11 months ago
Metadata Files
Readme License Citation

README.md

MalwareCTF

🔐 CTF Security: Hidden threats in Capture The Flag challenges

Authors: Alessandro Nessi & Alessandro Rebecchi
Date: March 2025

This project investigates whether CTF (Capture The Flag) challenges may contain hidden malware, using a combination of automated filtering, web scraping, and dynamic/static malware analysis.


📄 Paper

📥 You can download the final PDF from the Releases section.
Filename: CTF_Security_Paper.pdf


🧪 Methodology

  • 🌐 Web scraping via Selenium to collect CTFs from crackmes.one
  • 🛡️ Infrastructure setup using Proxmox, WireGuard, and Mullvad VPN
  • 🔬 Malware analysis via:
    • VirusTotal
    • Procmon / Process Explorer
    • Wireshark
    • Strings
    • Ghidra

📈 Results

  • Total CTFs analyzed: 4042
  • Suspicious matches: 70 (~1.73%)
  • No conclusive evidence of active malware found.
  • Flagged binaries often relied on obfuscation or packers common in reverse engineering challenges.

💡 Key Takeaways

Even when challenges are flagged by antivirus solutions, further analysis is required.
False positives are common. Secure environments are essential.


📜 License

This work is released under the Do What The Fuck You Want To Public License v2.


🙌 Citation

If you use this work, please consider citing us. Citation information is available in CITATION.cff.

Owner

  • Login: Alexreb04
  • Kind: user

Citation (CITATION.cff)

cff-version: 1.2.0
message: "If you use this paper, please cite it as below."
authors:
  - family-names: Nessi
    given-names: Alessandro
  - family-names: Rebecchi
    given-names: Alessandro
title: "CTF Security: Hidden threats in Capture The Flag challenges"
date-released: 2025-03-01
version: 1.0
url: https://github.com/Alexreb04/MalwareCTF/
license: DWTFYWPL-2.0

GitHub Events

Total
  • Watch event: 1
  • Push event: 3
Last Year
  • Watch event: 1
  • Push event: 3