CTF Writeups
A collection of write-ups from Capture The Flag hacking competitions
Vulnerable SSL/TLS Versions: - SSLv2: Exposure and tampering in real-time, susceptible to MITM and Bleichenbacher '98 attack. - SSLv3: Decryption of data through BEAST and POODLE attacks. - TLSv1.0: Decryption of data through BEASTly attack. - DROWN: Decryption of data through key reuse across TLS versions. Vulnerable Cipher Suites: - NULL: Exposure and tampering in real-time.
A collection of write-ups from Capture The Flag hacking competitions
Comprehensive reference guide for bug bounty hunters with detailed information on various vulnerabilities, platforms, tools, and best practices.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
A platform offering hacking missions to test and enhance skills.
CloudGoat is a 'Vulnerable by Design' AWS deployment tool for honing cloud cybersecurity skills through 'capture-the-flag' style scenarios.
Comprehensive tutorial series on ARM Assembly covering various topics.