WhatTheHack : A Collection Of Challenge Based Hack

WhattheHack is a challenge based hackathon format. A collection of challenge based hack-a-thons including student guide, proctor guide, lecture presentations, sample/instructional code and templates.

What, Why and How

  • “What the Hack” is a challenge based hackathon format
  • Challenges describe high-level tasks and goals to be accomplished
  • Challenges are not step-by-step labs
  • Attendees work in teams of 3 to 5 people to solve the challenges
  • Attendees “learn from” and “share with” each other
  • By having to “figure it out”, attendee knowledge retention is greater
  • Proctors provide guidance, but not answers to the teams
  • Emcees provide lectures & demos to setup challenges & review solutions
  • What the Hack can be hosted in-person or virtually via MS Teams

Also Read – See-SURF : Python Based Scanner To Find Potential SSRF Parameters

How to Add Your Hack

We welcome all new hacks! The process for doing this is:

  • Fork this repo into your own github account
  • Create a new branch for your work
  • Add a new top level folder using the next number in sequence, eg:
    • 011-BigNewHack
  • Within this folder, create two folders, each with two folders with in that looks like this:
    • Host
      • Guides
      • Solutions
    • Student
      • Guides
      • Resources
  • The content of each folder should be:
    • Student/Guides: The Student’s Guide
    • Student/Resources: Any template or “starter” files that students may need in challenges
    • Host/Guides: The Proctor’s Guide lives here as well as any Lecture slide decks
    • Host/Solutions: Specific files that the proctors might need that have solutions in them.
  • Once your branch and repo have all your content and it formatted correctly, follow the instructions on this page to submit a pull request back to the main repository:
R K

Recent Posts

BypassAV : Techniques To Evade Antivirus And EDR Systems

BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and…

15 hours ago

ComDotNetExploit : Exploiting Windows Protected Process Light (PPL)

ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows…

15 hours ago

Trigon : A Revolutionary Kernel Exploit For iOS

Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability.…

15 hours ago

Bug Bounty Report Templates : Enhancing Efficiency In Vulnerability Reporting

Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They…

15 hours ago

FullBypass : A Tool For AMSI And PowerShell CLM Bypass

FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained…

17 hours ago

Carseat : A Python Implementation Of Seatbelt

Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool,…

20 hours ago