Mohammed AmerBlackHat CTF Writeup: Breaking Down the Timestamp Challenge ⏳Hello everyone, Mohammed here again. I know it’s been a long time, but I’m back again for the writeup, and this time, I’m diving deep into…Nov 28
Ahmed JalilBlackHat MEA 2024 CTF | Day 2 | GhostDevice |Hello everyone, this is a writeup for the hard forensics challenge GhostDevice from BlackHat MEA 24' CTF from Day 2.5d ago
Hamza HaroonArtifact — BlackHat MEA 24 Qualifications Forensics WriteupArtifact (Easy — 90pts)Oct 281Oct 281
WhcyberusInstalling Low Orbit Ion Cannon (LOIC) in Kali Linux (Debian)LOIC is a popular opensource DDoS and enterprise stress generation tool renowned for its use in compromising Microsoft, Apple over the…May 3, 2023May 3, 2023
LetMeDayDreamResearch Note — Bypassing Entra ID Conditional Access Like APT: A Deep Dive Into Device…More furtherSep 10Sep 10
Mohammed AmerBlackHat CTF Writeup: Breaking Down the Timestamp Challenge ⏳Hello everyone, Mohammed here again. I know it’s been a long time, but I’m back again for the writeup, and this time, I’m diving deep into…Nov 28
Ahmed JalilBlackHat MEA 2024 CTF | Day 2 | GhostDevice |Hello everyone, this is a writeup for the hard forensics challenge GhostDevice from BlackHat MEA 24' CTF from Day 2.5d ago
Hamza HaroonArtifact — BlackHat MEA 24 Qualifications Forensics WriteupArtifact (Easy — 90pts)Oct 281
WhcyberusInstalling Low Orbit Ion Cannon (LOIC) in Kali Linux (Debian)LOIC is a popular opensource DDoS and enterprise stress generation tool renowned for its use in compromising Microsoft, Apple over the…May 3, 2023
LetMeDayDreamResearch Note — Bypassing Entra ID Conditional Access Like APT: A Deep Dive Into Device…More furtherSep 10
Piggy Bank by Prachi DoshiHacker Summer Camp Diaries — Episode 1t’s been a year since I moved to the U.S. to pursue my Master’s in Information Security at CMU, and as a security enthusiast, attending…Sep 91
dnelsakaBHMEA CTF 2024 Quals Crypto ChallengeHello! I’m Youssef, a Web/Cryptography CTF player from the 0xL4ugh Team. I’ll be sharing my solutions for the crypto challenges I solved in…Sep 3
eXpl0it_32Icons of Intrusion: The Greatest Hackers in Tech HistoryIn the shadows of the digital realm, where firewalls are mere obstacles and code is the ultimate weapon, hackers have carved their…Nov 271