Neural Cipher Machine - EotW CTF SS CASE IT 2025 Reverse Engineering Writeup

2025-05-27

Reverse engineering obfuscated Python neural cipher algorithms to break AI regime access control systems

#ctf#reverse-engineering#python#obfuscation#cipher-analysis#algorithm-reversal#ss-case-it-2025

EotW CTF SS CASE IT 2025 - Regime Monitor Writeup

2025-05-27

Infiltrating the AI Regime's surveillance dashboard through classic SQL injection. Learn how to exploit database vulnerabilities to extract hidden system secrets and deactivate surveillance networks.

#web-security#sql-injection#database#sqlite#union-attack#ctf#surveillance

Regime Rotation - EotW CTF SS CASE IT 2025 Cryptography Writeup

2025-05-27

Breaking basic Caesar cipher encryption used in AI regime training protocols - a beginner's guide to classical cryptography

#ctf#cryptography#caesar-cipher#rot13#classical-crypto#ss-case-it-2025

EotW CTF SS CASE IT 2025 - The Resistance Hub Writeup

2025-05-27

Infiltrating the resistance communication hub through source code analysis and Base64 decoding. Learn how to discover hidden secrets in JavaScript code and decode obfuscated intelligence data.

#web-security#source-code-analysis#base64#javascript#reconnaissance#ctf#steganography

EotW CTF SS CASE IT 2025 - Resistance Terminal Writeup

2025-05-27

Breaking into the AI Regime's secure terminal through a classic buffer overflow vulnerability. A beginner-friendly PWN challenge featuring the resistance against AI oppression.

#pwn#buffer-overflow#binary-exploitation#ctf#gets-vulnerability#ret2func

EotW CTF SS CASE IT 2025 - Signal Intercept Writeup

2025-05-27

Intercepting hidden signals in the AI Regime's communication system through HTTP header analysis. Learn how to use proxy tools to discover fragmented flags across multiple endpoints and custom headers.

#web-security#http-headers#burp-suite#reconnaissance#proxy-tools#ctf#signal-analysis

BlackHat MEA 2024 - Secure Portal Writeup

2024-11-28

Analyzing a critical vulnerability in Prisma ORM authentication, its exploitation using query operators, and best practices to secure web applications.

#web-security#prisma#injection#hacking#authentication