
AASTU CSC CTF | Hidden in Plain Sight 01
Cyber Night CTF Day 01 Walkthrough Challenge 1 Level: Easy 🟢 Challenge Link: Hidden in plain sight Technique: EXIF-based Steganography Tool: Exiftool Point: 100 Description: What if your e...
Cyber Night CTF Day 01 Walkthrough Challenge 1 Level: Easy 🟢 Challenge Link: Hidden in plain sight Technique: EXIF-based Steganography Tool: Exiftool Point: 100 Description: What if your e...
Cyber Night CTF Day 01 Walkthrough Challenge 2 Level: Intermediate 🟡 Challenge Link:Echoes of silence Technique: Audio Spectrogram Steganography (Text-based) Tool: Sonic Visualizer Point: 20...
Exploring Windows Sandbox: A Secure Testing Environment for Cybersecurity Enthusiasts As cybersecurity researchers and ethical hackers, we often need to interact with suspicious software in a safe...
Can you exfiltrate the root flag? This CTF (Capture The Flag) challenge is a Easy level Linux box focused on privilege escalation and enumeration. The goal is to gain access to the system, escala...
Welcome to my latest cybersecurity journey! I am launching a comprehensive TryHackMe walkthrough series, covering different rooms across various cybersecurity fields. This walkthrough aims to guide...
Investigating Ransomware with ProcDOT | TryHackMe Dunkle Materie The firewall alerted the Security Operations Center that one of the machines at the Sales department, which stores all the custom...
Level 1 - Intro OpenVPN https://tryhackme.com/room/openvpn Welcome https://tryhackme.com/jr/welcome Intro to Researching https://tryhackme.com/room/introtoresearch Crash Course Pentesting...
Injection flaws occur when user-controlled input is interpreted as commands or parameters by an application. They are common and can lead to serious security risks, depending on the technologies us...
Malware Detection and Analysis using Machine Learning Malware Detection and Analysis using Machine Learning WebApp is a robust tool designed to provide users with an intuitive interface for analyz...