FlagYard: Pooking Write-up
Challenge Description Explore the cars world with Pooking.com Challenge Link: FlagYard Pooking Reconnaissance & Initial Testing In the login, we are given two credentials for the test ...
Challenge Description Explore the cars world with Pooking.com Challenge Link: FlagYard Pooking Reconnaissance & Initial Testing In the login, we are given two credentials for the test ...
Challenge Description: Welcome to our E-commerce website, I wish you enjoy the journey. First Man Standing Challenge Link: FlagYard: NOSJ Fingerprinting The website has two accounts to lo...
Challenge Description Development is in progress. CTF Link: FlagYard: Under Construction We are given a single login page to start with I started by fuzzing the target and filtering the res...
Challenge Description The flag got lost, can you retrieve it? Challenge Link -> LostFlag Looking at the decompiled code, we can see that the flag is lost after the function call loadingAn...
Hasher Description: Malware developers always use hashing to hide things. Challenge Link -> Hasher I first used exiftool on the file $ exiftool Hasher.exe ExifTool Version Number ...
Introduction Room URL: Side Quest3: Carrotbane of My Existence This room is part of the TryHackMe Advent of Cyber 2025 series and focuses on abusing AI-powered services through logic flaws, promp...
Write-up for the CyberXbytes & KFU Cybersecurity Club CTF Challenge Competition held on November 26, 2025. Reverse Engineer XORcist Description: Think you got what it takes? nothing but a ha...
Introduction This write-up covers my solutions to the Reverse Engineering challenges from CyberXBytes CTF 2025, held on November 15, 2025. timmy wish Description: its a curse… its a storm full o...
Introduction Challenge Link: REloaded This room is dedicated for the RE challenges, each challenge has unique concepts divided in each binaries. Level 0 This challenge is the most basic of RE. ...
Introduction Challenge Link : DearQA Reverse engineer the binary and exploit development. Binary Exploit First start by checking the security controls applied into the binary checksec --file=D...