Jan 1 · 2 min read · On Day 24, I reached the final technical hurdle before the ultimate battle with King Malhare. The mission, "Hoperation Eggsploit," required me to shut down a web control panel that the evil Easter Bunnies were using to keep a wormhole open for reinfo...
Join discussion
Nov 28, 2025 · 10 min read · The first thing you learn when you hang around real locksmiths and real operators is that most locks are lies. They tell a story about safety, about order, about the idea that the world can be neatly partitioned into what is yours and what is not. Th...
Join discussion
Jul 10, 2025 · 4 min read · LeetCode 496. Next Greater Element I The LeetCode problem "496. Next Greater Element I" asks us to find the first greater element to the right of each element in nums1 within nums2, where nums1 is a subset of nums2. If no such element exists, return...
Join discussion
Jul 8, 2025 · 6 min read · 647. Palindromic Substrings When tackling LeetCode 647 (Palindromic Substrings), there are multiple ways to solve the problem. Today, I'll walk through three distinct approaches: the Brute Force method, the Expand Around Centers technique, and the a...
Join discussion
Jun 24, 2025 · 6 min read · Welcome to my walkthrough of the Agent Sudo room on TryHackMe — a CTF that tests your ability to pivot through enumeration, hash cracking, steganography, and privilege escalation. This challenge blends web recon, curiosity-driven digging, and a touch...
Join discussion
May 24, 2025 · 4 min read · TL;DR: Today I tackled Container With Most Water and Roman to Integer problems, focusing on building solid foundations before optimization. Here's what I learned and how you can apply these concepts in technical interviews. 🎯 What HR Recruiters Nee...
Join discussionDec 5, 2024 · 9 min read · 💡 Brute force, hay giải thuật Vét Cạn là một giải thuật đơn giản và tự nhiên nhất trong khoa học máy tính. Lợi dụng sức mạnh và tốc độ tính toán của máy tính, người ta có thể giải rất nhiều vấn đề một cách rất “tay chân“ bằng brute force. Tuy nhiên,...
Join discussionNov 17, 2024 · 2 min read · Lab Scenario: Our objective is to understand and exploit a web application's broken brute-force protection, where the login credentials are submitted in JSON format. By manipulating the request to submit multiple credentials, we aim to bypass the pro...
Join discussion