Write-ups

Technical write-ups, vulnerability research, penetration testing reports, and cybersecurity case studies.

Browse 27 write-ups tools

SSH Tunnelling to Punch Through Corporate Firewalls – Updated take on one of the oldest LOLBINs Logo

A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.

0
Exposing Security Observability Gaps in AWS Native Security Tooling Logo

A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.

0
Boston Key Party CTF Logo

Boston Key Party CTF 2013 - cybersecurity competition with challenges in various domains.

0
r2con-2017 Logo

Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.

0
AndroidSlides Logo

A repository aiming to archive all Android security presentations and whitepapers from conferences.

0
Crypto Drainer Attack Logo

A deep dive into the Ledger connect-kit compromise decryption process.

0
Shell-Storm Repository Logo

A repository of CTF challenges and resources from various cybersecurity competitions.

0
CTFWriteupScrapper Logo

A web-based tool that scrapes and organizes CTF writeups from ctftime.org with prioritization features and a local database for easy access.

0
Twitter's Vine Source Code Dump Logo

A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.

0
CTF Writeups Collection Logo

A collection of CTF writeups from various competitions including picoCTF, GLUG, TUCTF, and HackTheBox challenges, providing detailed solutions and explanations for cybersecurity competition problems.

0
Malware Traffic Analysis Logo

A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.

0
CTF Write-ups 2013 Logo

A community-maintained archive of CTF write-ups and source files from cybersecurity competitions held in 2013.

0
2019 BambooFox CTF Official Write Up Reverse Logo

A write-up of the reverse engineering challenge from the 2019 BambooFox CTF competition

0
CTF Write-Ups SababaSec Logo

A collection of CTF challenge write-ups and solutions from the SababaSec cybersecurity team covering competitions from 2019 to 2022.

0
CTF Write-ups Repository (2014) Logo

A collaborative repository of CTF write-ups and source files from 2014 competitions that allows community contributions to address scattered documentation issues.

0
CTF Write-ups Repository (2016) Logo

A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.

0
pwntools-write-ups Logo

A collection of CTF write-ups demonstrating the use of pwntools for solving binary exploitation challenges across various cybersecurity competitions.

1
CTF Write-ups 2015 Repository Logo

A centralized repository containing CTF source files and write-ups from 2015 competitions, providing accessible documentation and solutions for cybersecurity challenges.

0
Android-Reports-and-Resources Logo

A collection of security reports and resources documenting various Android application vulnerabilities including hardcoded credentials, insecure deeplinks, and code execution flaws.

0
left-pad.io Logo

A microservice for string padding to prevent global issues like the left-pad incident.

0
Bug Bounty Reference Logo

A categorized collection of bug bounty write-ups that documents real-world vulnerability discoveries and exploitation techniques across various security flaw types.

0
It's All About Time Logo

This article discusses the different types of remote timing attacks and provides defense strategies against them.

0
CTF Writeups Logo

A repository containing writeups and solutions from various Capture The Flag cybersecurity competitions spanning from 2015 to 2021.

0
CTF-Writeups Writeups of CTF challenges I solved Logo

A collection of detailed CTF challenge writeups organized by category, providing explanations of problems and their solutions for educational purposes.

0

Write-ups Tools - FAQ

Common questions about Write-ups tools including selection guides, pricing, and comparisons.

Technical write-ups, vulnerability research, penetration testing reports, and cybersecurity case studies.

Have more questions? Browse our categories or search for specific tools.