Skip to content
  • Home
  • Blogs
  • Projects
  • About
  • Work
  • Contact

CTF writeup

SSTI2 picoCTF: Web Exploitation Challenge Walkthrough

SSTI2 picoCTF Walkthrough: Web Exploitation Challenge Guide

SSTI2 picoCTF Walkthrough: Web Exploitation Challenge Guide Read More »

picoCTF Bookmarklet: Web exploitation

picoCTF Bookmarklet: Web exploitation

picoCTF Bookmarklet: Web exploitation Read More »

picoctf inspect html challange

picoCTF inspect HTML: Web exploitation

picoCTF inspect HTML: Web exploitation Read More »

picoctf introtoburp challange

picoCTF IntroToBurp: Web Exploitation

picoCTF IntroToBurp: Web Exploitation Read More »

Your Ultimate Guide to Subdomain Enumeration

Subfinder: Your Ultimate Guide to Subdomain Enumeration

Subfinder: Your Ultimate Guide to Subdomain Enumeration Read More »

PicoCTF Cookie Monster Secret Recipe writeup

PicoCTF Cookie Monster Secret Recipe writeup

PicoCTF Cookie Monster Secret Recipe writeup Read More »

PicoCTF Unminify Challenge

PicoCTF Unminify Writeup

PicoCTF Unminify Writeup Read More »

picoCTF Webcode Writeup

picoCTF WebDecode Writeup

picoCTF WebDecode Writeup Read More »

picoCTF hashcrack step by step writeup

picoCTF hashcrack step by step writeup Read More »

← Previous 1 2 3 Next →
  • Home
  • Blogs
  • Projects
  • About
  • Work
  • Contact

© 2025 AATHIL DUCKY
Security Researcher

  • LinkedIn
  • Github
  • Twitter
  • Instagram