FlagYard: Under Construction Write-up
Challenge Description Development is in progress. CTF Link: FlagYard: Under Construction We are given a single login page to start with I started by fuzzing the target and filtering the res...
Challenge Description Development is in progress. CTF Link: FlagYard: Under Construction We are given a single login page to start with I started by fuzzing the target and filtering the res...
Challenge Description The flag got lost, can you retrieve it? Challenge Link -> LostFlag Looking at the decompiled code, we can see that the flag is lost after the function call loadingAn...
Hasher Description: Malware developers always use hashing to hide things. Challenge Link -> Hasher I first used exiftool on the file $ exiftool Hasher.exe ExifTool Version Number ...
Introduction Room URL: Side Quest3: Carrotbane of My Existence This room is part of the TryHackMe Advent of Cyber 2025 series and focuses on abusing AI-powered services through logic flaws, promp...
Write-up for the CyberXbytes & KFU Cybersecurity Club CTF Challenge Competition held on November 26, 2025. Reverse Engineer XORcist Description: Think you got what it takes? nothing but a ha...
Introduction This write-up covers my solutions to the Reverse Engineering challenges from CyberXBytes CTF 2025, held on November 15, 2025. timmy wish Description: its a curse… its a storm full o...
Introduction Challenge Link: REloaded This room is dedicated for the RE challenges, each challenge has unique concepts divided in each binaries. Level 0 This challenge is the most basic of RE. ...
Introduction Challenge Link : DearQA Reverse engineer the binary and exploit development. Binary Exploit First start by checking the security controls applied into the binary checksec --file=D...
Introduction In this lab, we will build a safe and controlled virtual environment for malware analysis using VirtualBox and a Windows 10 virtual machine. The goal is to configure an isolated syste...
Introduction Challenge Link: Investigating Windows Investigate a compromised Windows machine to determine the actions taken by the attacker System Information View the system inforamtion that w...