-
PWN Rop chain Trick | CTF
H3ll0 pwn3rs !!! This article is made to explain some trick and methodologies that you can use to bypass some constraint in your ropchain creation I suppose that you undrstand...
-
Write Good Pentest Report | PENTEST
As Pentester, your job is not only find vulnerabilities. You must also write a clean report to explain your finding to technical and no technical user. So how to do...
-
PNPT tranning Osint module | PENTEST
What OSINT OSINT (Open Source Inteligence) is a methodology to gather analyse and making decision about information accessible publicly Topic we will cover OSINT Overview Note keeping Sock Puppet Image...
-
PicoCTF 2025 writeup | CTF
Pico CTF 2025 Write up . By Bug Reapers Team Pico CTF is an annual Cyber security competition for undergrade/grate Studen. Our Team Bug Reapers took part of 2025 one...
-
Linux Privilege Escalation | PENTEST
Linux privilege escalation Part 0x00: Enumeration Introduction System Enumeration Users Enumeration Network and Services Enumeration Files Enumeration Automation Introduction In Hacking , Enumeration is the most important part. Before Hacking...