Published onApril 23, 2025Ethernaut Challenge Series Part- 1EthernautSoliditySmart-Contract-HackingFoundryExploit a smart contract by hijacking ownership through its fallback mechanism.Read more →
Published onSeptember 29, 2024TheCyberThesisCtf F-24 - Web - CookieWebctfCookieWriteupManipulate the cookie to get the admin access.Read more →
Published onSeptember 22, 2024TheCyberThesis'24 - Cryptography - The Blockchain breachCryptographyctfBlockchainWriteupMD5-hash-collisionRecognize the pattern of a dataset to breach the blockchain.Read more →
Published onAugust 5, 2024MemLab Series-Lab 6Digital-ForensicsctfMemory-dumpVolatilityMemLabsRecover the data from the chrome history of a memory dump.Read more →
Published onJuly 31, 2024MemLab Series-Lab 5Digital-ForensicsctfMemory-dumpVolatilityMemLabsInvestigate strange files and a crashing application from a memory dump.Read more →