In this blog, I will be talking about how we hosted our CTF for free, the issues we faced and certain tips and tricks that…
Format string vulnerabilities are extremely interesting vulnerabilities by itself. Well then…
What is pwning??? Binary exploitation??? WHAT???
There was too much to learn than to compete in the competition. Spoiler alert, this is my first CTF finals, hope that justifies all the…
Deep CTF was a 24 hour CTF conducted on April 4th and started at 4 p.m. IST. I loved the CTF as it was not a very low…