Write-ups

Technical write-ups, vulnerability research, penetration testing reports, and cybersecurity case studies.

Explore 27 curated cybersecurity tools, with 14,630+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

SSH Tunnelling to Punch Through Corporate Firewalls – Updated take on one of the oldest LOLBINs Logo

A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.

0
Exposing Security Observability Gaps in AWS Native Security Tooling Logo

A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.

0
Boston Key Party CTF Logo

Boston Key Party CTF 2013 - cybersecurity competition with challenges in various domains.

0
r2con-2017 Logo

Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.

0
AndroidSlides Logo

A repository aiming to archive all Android security presentations and whitepapers from conferences.

0
Crypto Drainer Attack Logo

A deep dive into the Ledger connect-kit compromise decryption process.

0
Shell-Storm Repository Logo

A repository of CTF challenges and resources from various cybersecurity competitions.

0
CTFWriteupScrapper Logo

A web-based tool that scrapes and organizes CTF writeups from ctftime.org with prioritization features and a local database for easy access.

0
Twitter's Vine Source Code Dump Logo

A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.

0
CTF Writeups Collection Logo

A collection of CTF writeups from various competitions including picoCTF, GLUG, TUCTF, and HackTheBox challenges, providing detailed solutions and explanations for cybersecurity competition problems.

0
Malware Traffic Analysis Logo

A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.

0
CTF Write-ups 2013 Logo

A community-maintained archive of CTF write-ups and source files from cybersecurity competitions held in 2013.

0
2019 BambooFox CTF Official Write Up Reverse Logo

A write-up of the reverse engineering challenge from the 2019 BambooFox CTF competition

0
CTF Write-Ups SababaSec Logo

A collection of CTF challenge write-ups and solutions from the SababaSec cybersecurity team covering competitions from 2019 to 2022.

0
CTF Write-ups Repository (2014) Logo

A collaborative repository of CTF write-ups and source files from 2014 competitions that allows community contributions to address scattered documentation issues.

0
CTF Write-ups Repository (2016) Logo

A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.

0
pwntools-write-ups Logo

A collection of CTF write-ups demonstrating the use of pwntools for solving binary exploitation challenges across various cybersecurity competitions.

1
CTF Write-ups 2015 Repository Logo

A centralized repository containing CTF source files and write-ups from 2015 competitions, providing accessible documentation and solutions for cybersecurity challenges.

0
Android-Reports-and-Resources Logo

A collection of security reports and resources documenting various Android application vulnerabilities including hardcoded credentials, insecure deeplinks, and code execution flaws.

0
left-pad.io Logo

A microservice for string padding to prevent global issues like the left-pad incident.

0
Bug Bounty Reference Logo

A categorized collection of bug bounty write-ups that documents real-world vulnerability discoveries and exploitation techniques across various security flaw types.

0
It's All About Time Logo

This article discusses the different types of remote timing attacks and provides defense strategies against them.

0
CTF Writeups Logo

A repository containing writeups and solutions from various Capture The Flag cybersecurity competitions spanning from 2015 to 2021.

0
CTF-Writeups Writeups of CTF challenges I solved Logo

A collection of detailed CTF challenge writeups organized by category, providing explanations of problems and their solutions for educational purposes.

0