CybersecTools API access is now live!Learn More

Write-ups

Technical write-ups, vulnerability research, penetration testing reports, and cybersecurity case studies.

Browse 28 write-ups tools

Security research lab publishing vulnerability analyses and exploit research

A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.

A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.

Boston Key Party CTF 2013 - cybersecurity competition with challenges in various domains.

Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.

A repository aiming to archive all Android security presentations and whitepapers from conferences.

A deep dive into the Ledger connect-kit compromise decryption process.

A repository of CTF challenges and resources from various cybersecurity competitions.

A web-based tool that scrapes and organizes CTF writeups from ctftime.org with prioritization features and a local database for easy access.

A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.

A collection of CTF writeups from various competitions including picoCTF, GLUG, TUCTF, and HackTheBox challenges, providing detailed solutions and explanations for cybersecurity competition problems.

A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.

A community-maintained archive of CTF write-ups and source files from cybersecurity competitions held in 2013.

A write-up of the reverse engineering challenge from the 2019 BambooFox CTF competition

A collection of CTF challenge write-ups and solutions from the SababaSec cybersecurity team covering competitions from 2019 to 2022.

A collaborative repository of CTF write-ups and source files from 2014 competitions that allows community contributions to address scattered documentation issues.

A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.

A collection of CTF write-ups demonstrating the use of pwntools for solving binary exploitation challenges across various cybersecurity competitions.

A centralized repository containing CTF source files and write-ups from 2015 competitions, providing accessible documentation and solutions for cybersecurity challenges.

A collection of security reports and resources documenting various Android application vulnerabilities including hardcoded credentials, insecure deeplinks, and code execution flaws.

A microservice for string padding to prevent global issues like the left-pad incident.

A categorized collection of bug bounty write-ups that documents real-world vulnerability discoveries and exploitation techniques across various security flaw types.

This article discusses the different types of remote timing attacks and provides defense strategies against them.

A repository containing writeups and solutions from various Capture The Flag cybersecurity competitions spanning from 2015 to 2021.

Write-ups Tools - FAQ

Common questions about Write-ups tools including selection guides, pricing, and comparisons.

Technical write-ups, vulnerability research, penetration testing reports, and cybersecurity case studies.

Have more questions? Browse our categories or search for specific tools.