MSMolly Sohaneyinmollysohaney.hashnode.dev00CTF Writeup: i-love-my-bf-part1 | RE | BSidesSF 20262h ago · 5 min read · Description I bet my BF knows what the flag is... We're given a file: i_love_my_bf_part1.bf Overview A Brainfuck program prompts for a flag, then rejects any input with "Sorry... :(". Rather than gJoin discussion
MSMolly Sohaneyinmollysohaney.hashnode.dev00CTF Writeup: FlagFactoryPro | RE | Crypto | BSidesSF 20265d ago · 8 min read · Description Shoot, the trial on our copy of FlagFactory Pro expired right before we needed it for the CTF! Can you help? We're given a binary: ffpro Overview A 64-bit Linux binary simulates a pieceJoin discussion
PBPradip Bhattaraiinblog.pradeepbhattarai.me00Intigriti March 2026 XSS Challenge: Full Writeup5d ago · 8 min read · Initial Reconnaissance The challenge presents itself as the "Intigriti Secure Search Portal", an interface with a search box and a "Report it to Admin" link. That report link is the classic signal: thJoin discussion
HMHarsh Mishrainwriteups.dazaionline.org00The Game6d ago · 2 min read · Introduction The Game is a reverse-engineering / binary analysis challenge. The premise: a cipher hid critical secrets inside a Tetris binary. The goal is to analyze the supplied binary, extract the eJoin discussion
PPromiseinpromise-security.hashnode.dev00Cracking HackThisSite Basics: My Beginner Web Hacking JourneyApr 5 · 10 min read · LEVEL 1 Level 1 on HackThisSite is called “The Idiot Test”, and the page only shows a password box, a submit button, and a hint saying that if you have no idea what to do, you need to learn HTML. InstJoin discussion
IDIliya Dindarinblog.iliyadindar.site00UNION SELECT Unlocked: A Beginner’s Guide to UNION-Based SQLiApr 3 · 4 min read · Table of Contents 01 - Vulnerability Discovery 02 - Injection Detection 03 - Column Count Enumeration 04 - Reflected Column Discovery 05 - Database Enumeration 06 - Flag Extraction 01 - VulneJoin discussion
MSMolly Sohaneyinmollysohaney.hashnode.dev00CTF Writeup: caesar1 | Forensics | Crypto | BSidesSF 2026Apr 2 · 5 min read · Description We intercepted a weirdly glitched file. Apparently, Julius likes to switch things up often, every 10 pixels. We're given a file: caesar1.jpg Overview A JPEG image of sheet music has beeJoin discussion
DVDharshana Vijayindharsh-ctfwriteup.hashnode.dev00Building and Exploiting a Vulnerable Web Application (SQL Injection & XSS)Mar 31 · 3 min read · As part of my cybersecurity learning journey, I built a deliberately vulnerable web application using Python and Flask. The goal of this project was to understand how common web vulnerabilities work iJoin discussion
JJebitokinsharonjebitok.com00Develpy (CTF Challenge - THM)Mar 28 · 6 min read · Introduction Develpy is a beginner-friendly TryHackMe challenge that focuses on code injection and privilege escalation via cron job abuse. The attack surface starts with a custom Python 2 service rJoin discussion
JJebitokinsharonjebitok.com00Break Out The Cage (CTF Challenge - THM)Mar 28 · 18 min read · INTRO In this TryHackMe room, Break Out The Cage, we step into a Nicolas Cage-themed CTF that layers enumeration, classical cryptography, and privilege escalation into a full attack chain. The challenJoin discussion