Loading...
This article discusses the different types of remote timing attacks and provides defense strategies against them.
A collection of CTF write-ups demonstrating the use of pwntools for solving binary exploitation challenges across various cybersecurity competitions.
A three-part educational series documenting techniques for achieving domain administrator privileges in Windows environments, covering attack methods, defenses, and remediation strategies.
Security research lab publishing vulnerability analyses and exploit research
A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.
A collection of detailed CTF challenge writeups organized by category, providing explanations of problems and their solutions for educational purposes.
A collection of security reports and resources documenting various Android application vulnerabilities including hardcoded credentials, insecure deeplinks, and code execution flaws.
A repository containing writeups and solutions from various Capture The Flag cybersecurity competitions spanning from 2015 to 2021.
A collection of CTF challenge write-ups and solutions from the SababaSec cybersecurity team covering competitions from 2019 to 2022.
A web-based tool that scrapes and organizes CTF writeups from ctftime.org with prioritization features and a local database for easy access.
A community-maintained archive of CTF write-ups and source files from cybersecurity competitions held in 2013.
A collaborative repository of CTF write-ups and source files from 2014 competitions that allows community contributions to address scattered documentation issues.
A centralized repository containing CTF source files and write-ups from 2015 competitions, providing accessible documentation and solutions for cybersecurity challenges.
A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.
A repository aiming to archive all Android security presentations and whitepapers from conferences.
A collection of CTF writeups from various competitions including picoCTF, GLUG, TUCTF, and HackTheBox challenges, providing detailed solutions and explanations for cybersecurity competition problems.
A categorized collection of bug bounty write-ups that documents real-world vulnerability discoveries and exploitation techniques across various security flaw types.
Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.
CTF Writeups are detailed educational documents that explain the step-by-step solutions to Capture The Flag cybersecurity challenges, serving as learning resources for security professionals.
Boston Key Party CTF 2013 - cybersecurity competition with challenges in various domains.
A microservice for string padding to prevent global issues like the left-pad incident.
A repository of CTF challenges and resources from various cybersecurity competitions.
A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.
A write-up of the reverse engineering challenge from the 2019 BambooFox CTF competition
A deep dive into the Ledger connect-kit compromise decryption process.
A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.
A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.
Get strategic cybersecurity insights in your inbox