!abdu11ahPCC{PCC-CTF-QUALS-24}This blog has the solution for two crypto challenges that I solved at the Pakistan Cyber Security Challenges Qualification Round 2024.Oct 21Oct 21
!abdu11ahcsawctf{CSAW-CTF-24}This blog has the write-up for a PWN challenge that I solved in the CSAW CTF’24. So without any further a do.Sep 19Sep 19
!abdu11ahUAC Bypass: Memory InjectionIn this blog, we will have a look into the UAC Bypass using the memory injection method in order to elevate our privileges.Sep 17Sep 17
!abdu11ahBehind the Mask: The Dark Art of Token ImpersonationIn this blog, I will give a step-by-step tutorial on how you can escalate your privileges on a machine using the Token Impersonation…Aug 27Aug 27
!abdu11ahKypo OpenStack Deployment GuideThis blog is all going to be about deploying Kypo OpenStack.Aug 20Aug 20
!abdu11ahBuild your own Cyber Range | Home Lab GuideA step-by-step guide for building your Home-Lab/Cyber-Range. So, without any further a do.Jun 22Jun 22
!abdu11ahCHC{CTS’24Hackathon}Writeups for all the OSINT challenges from the CTS Hackathon’24. So, without any further action.May 27May 27