#hacking
Read more stories on Hashnode
Articles with this tag
During in the process of reverse engineering binaries, a common problem arises. How do I reverse engineer stripped binaries? There are no symbols to...
When I was learning how to tackle pwn challenges in CTFs, I had a tough time finding a single, clear guide that could show me the ropes of actually...
Using python to capture and project data ยท While reading the news, I have seen a lot of people try exfiltrating data from compromised systems that are...
Intro This is a write-up for PicoCTF 2022: Buffer Overflow 1. This is one of my favourite challenges to do. I recommend solving it for yourself before...
Sherlock is a powerful command line tool that can be used to find usernames across many websites and social networks. It works on Linux, MacOS and...
This is a write-up to Google's Beginners Quest CTF for questions 1 & 2. Challenge 1 When we first go to the webpage we are greeted with a login...