A curated collection of my Capture the Flag (CTF) challenge writeups. This repo documents my journey through cybersecurity puzzles β covering everything from basic challenges to deeper, technical exploitation.
π‘ How the challenge works
π οΈ Tools and techniques used
π§ My reasoning and methodology
π© Final solution + key takeaways
Web Exploitation
Forensics
Cryptography
Reverse Engineering
OSINT
Binary Exploitation (Pwn)
Misc Challenges
Wireshark
SleuthKit
Autopsy
FTK Imager
ExifTool
Audacity (Spectrogram / Audio Analysis)
Burp Suite
Python
Linux utilities
Custom scripts & payloads
Track my progress
Build deeper cybersecurity skills
Share knowledge through detailed explanations
Produce clear, reproducible writeups
All content in this repository is for educational and ethical purposes only.
Nothing demonstrated here should ever be used for unauthorized access or malicious activity.
More writeups will be added regularly as I tackle new challenges β feel free to explore, learn, or suggest improvements.