Skip to content
  • Home
  • Blogs
  • Projects
  • About
  • Work
  • Contact

Cybersecurity Projects

picoctf introtoburp challange

picoCTF IntroToBurp: Web Exploitation

picoCTF IntroToBurp: Web Exploitation Read More »

Your Ultimate Guide to Subdomain Enumeration

Subfinder: Your Ultimate Guide to Subdomain Enumeration

Subfinder: Your Ultimate Guide to Subdomain Enumeration Read More »

PicoCTF Cookie Monster Secret Recipe writeup

PicoCTF Cookie Monster Secret Recipe writeup

PicoCTF Cookie Monster Secret Recipe writeup Read More »

picoCTF Webcode Writeup

picoCTF WebDecode Writeup

picoCTF WebDecode Writeup Read More »

picoctf head-dump writeup

picoCTF heapdump challenge writeup

picoCTF heapdump challenge writeup Read More »

n0s4n1ty CTF PHP reverse shell exploitation

n0s4n1ty 1 CTF Writeup: Web Exploitation Challenge Walkthrough

n0s4n1ty 1 CTF Writeup: Web Exploitation Challenge Walkthrough Read More »

Top 10 Cybersecurity Project Ideas for Final Year with Source Code

Top 10 Cybersecurity Project Ideas for Final Year with Source Code Read More »

← Previous 1 2
  • Home
  • Blogs
  • Projects
  • About
  • Work
  • Contact

© 2025 AATHIL DUCKY
Security Researcher

  • LinkedIn
  • Github
  • Twitter
  • Instagram