
CTF BIBLE - STEGANOGRAPHY
Collection of Tools, Cheats sheets I use for solving various kinds of CTF Challenges
Collection of Tools, Cheats sheets I use for solving various kinds of CTF Challenges
Collection of Tools, Cheats sheets I use for solving various kinds of CTF Challenges
This boot2root machine is brilliant for new starters. You will have to enumerate this machine by finding open ports, do some online research, decoding hashes, brute forcing a pop3 login and much more!
Learn how to brute, hash cracking and escalate privileges in this box!
Uncover how attackers exploit .docx files using MSHTML components like mhtml. Learn to analyze .docx structures exposing malicious metadata and payloads.
This blog features writeups for the Hacked & Recovered challenges from the GladiaTOR by Spiro CTF.
This blog examines a fake ChatGPT browser extension used as malware to steal user data, including credentials and keystrokes. It highlights the extension's malicious capabilities, such as evasion t...
This blog post explains the thought process in creating the P3rf3ctr00t CTF as well as how different challenges were meant to be solved.
This blog post explores USB packet capture (Pcap) traffic analysis, focusing on what occurs when a keyboard is plugged in. It covers packet dissection, traffic filtering, and decoding of keyboard k...
Forest - Easy Hackthebox machine writeup on Active Directory