$ cat /proc/ctfbase/info
CTF Base
grep your way through 1,600 CTF writeups
Hybrid AI search|MCP for Claude/Cursor|Complete exploits with flags
$ grep -ri
Try:
$ google "heap overflow ctf writeup glibc 2.35"
✗ 10 results, 3 are 404
✗ 2 are wrong glibc version
✗ 45 minutes wasted
Competition is over.
$ grep "heap overflow glibc 2.35" /writeups/pwn/
✓ 7 results in 0.8 seconds
✓ First result: exact technique
✓ Working exploit code included
Challenge solved.
$ ctfbase search "format string"
Hybrid AI Search
Full-text + vector similarity. Finds writeups even across languages. 0.5-1.4s.
Found 23 results in 0.6s
$ claude "how to exploit this?"
[MCP] searching ctfbase... found 5 matches
MCP Server
Connect Claude, Cursor, or any MCP client. Real solutions, not guesses.
mcp.ctfbase.com/mcp
$ cat /writeups/pwn/heap-uaf/flag.txt
flag{r34l_fl4g5_fr0m_c0mp3t1t10n5}
Real Solutions
Complete writeups with flags, exploit code, and step-by-step from real CTFs.
$ cat /proc/ctfbase/stats
Your AI assistant just got CTF superpowers
Connect CTF Base to Claude, Cursor, or any MCP-compatible client
You:"How do I exploit a format string vulnerability?"
AI: *gives generic textbook answer*
You:"How do I exploit a format string vulnerability?"
[MCP] searched CTF Base, 23 writeups found
"Based on real writeups from PicoCTF 2024, here's a working approach..."
Connect in 30 seconds:
$ claude mcp add ctfbase https://mcp.ctfbase.com/mcp
Follow new writeups in Telegram
Get newly published writeups, short summaries, and direct links in @ctfbase_updates.