Cybersecurity Enthusiast | Penetration Tester | CTF Player
"The journey of a thousand exploits begins with a single vulnerability."
- ๐ฏ Machines Pwned
- ๐ Digital Forensics & Incident Response
- ๐ฉ CTF Challenges
- ๐ Statistics
- ๐ ๏ธ Tools & Technologies
- ๐ Learning Path
54 Machines Successfully Compromised | Difficulty Range: Easy โ Insane
๐ฅ๏ธ View All Machines (Click to expand)
Machine | OS | Key Techniques | Write-up |
---|---|---|---|
Blue | Windows | EternalBlue, MS17-010 | ๐ |
Jerry | Windows | Tomcat Manager, WAR Upload | ๐ |
Lame | Linux | Samba 3.0.20, UnrealIRCd | ๐ |
Netmon | Windows | PRTG Network Monitor | ๐ |
Legacy | Windows | MS08-067, MS17-010 | ๐ |
Machine | OS | Key Techniques | Write-up |
---|---|---|---|
Photobomb | Linux | Command Injection, Sinatra | ๐ |
Precious | Linux | PDFKit, YAML Deserialization | ๐ |
Shoppy | Linux | NoSQL Injection, Docker | ๐ |
Cap | Linux | PCAP Analysis, Capabilities | ๐ |
Busqueda | Linux | Searchsploit, Git | ๐ |
Machine | OS | Key Techniques | Write-up |
---|---|---|---|
Keeper | Linux | Request Tracker, KeePass | ๐ |
Analytics | Linux | Metabase, CVE-2023-38646 | ๐ |
Devvortex | Linux | Joomla, CVE-2023-23752 | ๐ |
18 Sherlock Cases Investigated | SOC Analysis โข DFIR โข Malware Analysis โข Threat Intelligence
๐ต๏ธ View All Cases (Click to expand)
Case | Category | Skills Applied | Analysis |
---|---|---|---|
Meerkat | SOC | Log Analysis, SIEM | ๐ |
Litter | SOC | Network Security Monitoring | ๐ |
Case | Category | Skills Applied | Analysis |
---|---|---|---|
Bumblebee | DFIR | Memory Forensics, Volatility | ๐ฌ |
Logjammer | DFIR | Web Log Analysis | ๐ฌ |
Hyperfiletable | DFIR | File System Analysis | ๐ฌ |
Tracer | DFIR | Network Forensics | ๐ฌ |
Case | Category | Skills Applied | Analysis |
---|---|---|---|
Lockpick | Malware | Static/Dynamic Analysis | ๐ฌ |
Heartbreaker-Continuum | Malware | APT Analysis | ๐ฌ |
Subatomic | Malware | Reverse Engineering | ๐ฌ |
Case | Category | Skills Applied | Analysis |
---|---|---|---|
Constellation | TI | OSINT, Attribution | ๐ฏ |
45 Challenges Solved | Buffer Overflows โข ROPchains โข Format Strings โข Heap Exploitation
๐ View PWN Challenges (Click to expand)
Challenge | Difficulty | Technique | Solution |
---|---|---|---|
racecar | โญ | Buffer Overflow | ๐ป |
You know 0xDiablos | โญ | Return to Function | ๐ป |
Sick ROP | โญโญโญ | ROP Chain | ๐ป |
Kernel Adventures: Part 1 | โญโญโญโญ | Kernel Exploitation | ๐ป |
1 Challenge Solved | Game Hacking โข Memory Manipulation
๐ฏ View Game PWN Challenges (Click to expand)
Challenge | Difficulty | Technique | Solution |
---|---|---|---|
CubeMadness1 | โญโญ | Game Logic Manipulation | ๐ฎ |
21 Challenges Solved | SSTI โข SQLi โข XSS โข Authentication Bypass
๐ธ๏ธ View Web Challenges (Click to expand)
Challenge | Difficulty | Vulnerability | Solution |
---|---|---|---|
Templated | โญ | SSTI | ๐ |
LoveTok | โญ | PHP Deserialization | ๐ |
Phonebook | โญ | LDAP Injection | ๐ |
33 Challenges Solved | Memory Analysis โข Network Traffic โข Disk Forensics
๐ View Forensics Challenges (Click to expand)
Challenge | Difficulty | Analysis Type | Solution |
---|---|---|---|
Illumination | โญ | Git Forensics | ๐ |
MarketDump | โญ | Memory Dump | ๐ |
Scripts and Formulas | โญโญโญ | Office Document Analysis | ๐ |
9 Challenges Solved | RSA โข AES โข Classical Ciphers โข Hash Functions
๐ View Crypto Challenges (Click to expand)
Challenge | Difficulty | Crypto Type | Solution |
---|---|---|---|
BabyEncryption | โญ | Simple XOR | ๐ |
Weak RSA | โญโญ | RSA Factorization | ๐ |
Gonna-Lift-Em-All | โญโญโญ | Lattice Cryptanalysis | ๐ |
18 Challenges Solved | Static Analysis โข Dynamic Analysis โข Malware Unpacking
โ๏ธ View Reversing Challenges (Click to expand)
Challenge | Difficulty | Analysis Type | Solution |
---|---|---|---|
Baby RE | โญ | Basic Static Analysis | โ๏ธ |
Impossible Password | โญ | Password Cracking | โ๏ธ |
Shattered Tablet | โญโญโญ | Advanced Reversing | โ๏ธ |
6 Challenges Solved | Social Media โข Geolocation โข Data Mining
๐ View OSINT Challenges (Click to expand)
Challenge | Difficulty | OSINT Type | Solution |
---|---|---|---|
Easy Phish | โญ | Email Analysis | ๐ |
0ld is g0ld | โญโญ | Historical Data | ๐ |
6 Challenges Solved | Android APK Analysis โข iOS Security โข Mobile Forensics
๐ฒ View Mobile Challenges (Click to expand)
Challenge | Difficulty | Platform | Solution |
---|---|---|---|
Cat | โญ | Android | ๐ฒ |
APKey | โญโญ | Android | ๐ฒ |
Manager | โญโญโญ | Android | ๐ฒ |
3 Challenges Solved | Firmware Analysis โข UART โข GPIO
๐ง View Hardware Challenges (Click to expand)
Challenge | Difficulty | Hardware Type | Solution |
---|---|---|---|
Debugging Interface | โญ | UART | ๐ง |
Gawk | โญโญ | Firmware | ๐ง |
12 Challenges Solved | Programming โข Logic Puzzles โข Steganography
๐ฏ View Misc Challenges (Click to expand)
Challenge | Difficulty | Type | Solution |
---|---|---|---|
Canvas | โญ | Programming | ๐ฏ |
Hackerman | โญโญ | Logic | ๐ฏ |
1 Challenge Solved | Smart Contract Analysis โข DeFi Security
๐ View Blockchain Challenges (Click to expand)
Challenge | Difficulty | Blockchain | Solution |
---|---|---|---|
Survival of the Fittest | โญโญ | Ethereum | ๐ |