Cyber Apocalypse CTF 2025: Tales from Eldoria A deep dive into the Eldoria CTF—solving OSINT, AI, ML, reverse engineering, and web challenges. This writeup breaks down my approach, solutions, and lessons learned in the quest for the Dragon’s Heart.
Cyber League 2025 CTF Writeup: Crypto, Forensics, Cloud & More Our Cyber League 2025 CTF writeup covers Crypto, Forensics, Cloud, and Misc challenges. Detailed solutions, insights, and lessons learned—this guide will level up your cybersecurity game!
IrisCTF 2025 A writeup on the flags we cracked during IrisCTF 2025, covering Forensics and OSINT. Thanks to IrisSec for this fun and educational CTF experience!
Advent of Cyber 2024: Week 3 Challenges Unwrapped A walkthrough of Week 3 challenges from Advent of Cyber 2024, covering cryptographic puzzles, layered obfuscation, and practical tips for tackling similar CTF challenges efficiently.
Advent of Cyber 2024: Week 2's Challenges Unwrapped Dive into Week 2 of Advent of Cyber 2024 with solutions to challenges involving secure configurations, network puzzles, and practical techniques to enhance your cybersecurity skills.
Advent of Cyber 2024: Week 1's Challenges Unwrapped Week 1 of TryHackMe’s Advent of Cyber 2024 dives into OPSEC failures, vulnerabilities, and malware mischief. Explore SOC-mas tales of glitches, breaches, and cybersecurity triumphs!
Hack The Box Sherlock: Takedown Suspicious network activity points to a potential security breach. Dive into this investigation as we analyze PCAP data, uncover hidden threats, and trace unauthorized access with Wireshark.
SANS Holiday Hack Challenge™ 2024 - Elf Minder 9000 Navigate the route, collect crates, and conquer the challenge! Use springs to jump, tunnels to tunnel duh, and make it from the green flag to the goal. Complete this thrilling puzzle adventure together!
SANS Holiday Hack Challenge™ 2024 - Elf Connect Join Angel Candysalt in the 2024 Sans Holiday Hack Challenge! Connect the dots in this thrilling puzzle game, where every move counts. Ready for a mind-bending experience? Let's solve it together!
Static Analysis of the Dexter Malware Explore a detailed static analysis of malware, uncovering key indicators of compromise, malicious activities, and underlying techniques used for process monitoring and memory manipulation.
HTB Sherlock Brutus - Analyzing SSH Brute-Force and Unix Logs Explore how to detect SSH brute-force attacks and track post-compromise actions using Unix logs in HackTheBox's Sherlock Brutus challenge. From access tracing to privilege escalation, uncover critical insights.
TensorBoard Guide: Essential Tool for Model Training and Evaluation Learn how TensorBoard transforms deep learning workflows with powerful visualization tools, enabling comprehensive model analysis, performance tracking, and insight-driven optimization.
U-Net: The Doctor’s New Digital Sidekick for Medical Imaging Can AI help doctors see what even trained eyes might miss? Dive into how the Eff-UNet model pushes boundaries in pneumonia detection, bringing us closer to an AI-assisted future in diagnostics.
Embark on Your Deep Learning Journey with Arch Linux Think deep learning is tough? Try doing it on Arch Linux. It’s like assembling IKEA furniture with no instructions—challenging but incredibly rewarding. Join me as we tackle this setup together, armed with patience, humor, and a willingness to embrace the chaos!