FlagYard: LostFlag Write-up
Challenge Description The flag got lost, can you retrieve it? Challenge Link -> LostFlag Looking at the decompiled code, we can see that the flag is lost after the function call loadingAn...
Challenge Description The flag got lost, can you retrieve it? Challenge Link -> LostFlag Looking at the decompiled code, we can see that the flag is lost after the function call loadingAn...
Hasher Description: Malware developers always use hashing to hide things. Challenge Link -> Hasher I first used exiftool on the file $ exiftool Hasher.exe ExifTool Version Number ...
Introduction Room URL: Side Quest3: Carrotbane of My Existence This room is part of the TryHackMe Advent of Cyber 2025 series and focuses on abusing AI-powered services through logic flaws, promp...
Write-up for the CyberXbytes & KFU Cybersecurity Club CTF Challenge Competition held on November 26, 2025. Reverse Engineer XORcist Description: Think you got what it takes? nothing but a ha...
Introduction This write-up covers my solutions to the Reverse Engineering challenges from CyberXBytes CTF 2025, held on November 15, 2025. timmy wish Description: its a curse… its a storm full o...
Introduction Challenge Link: REloaded This room is dedicated for the RE challenges, each challenge has unique concepts divided in each binaries. Level 0 This challenge is the most basic of RE. ...
Introduction Challenge Link : DearQA Reverse engineer the binary and exploit development. Binary Exploit First start by checking the security controls applied into the binary checksec --file=D...
Introduction In this lab, we will build a safe and controlled virtual environment for malware analysis using VirtualBox and a Windows 10 virtual machine. The goal is to configure an isolated syste...
Introduction Challenge Link: Investigating Windows Investigate a compromised Windows machine to determine the actions taken by the attacker System Information View the system inforamtion that w...
The Crime Lab Challenge Link: The Crime Utilize ALEAPP to analyze Android device artifacts, reconstructing a victim’s financial details, movements, and communication patterns. Scenario We’re cu...