Skip to content
  • Home
  • Blogs
  • Projects
  • About
  • Work
  • Contact

penetration testing

AI in cybersecurity analysis with ChatGPT

AI in Cybersecurity: How ChatGPT is Changing Ethical Hacking

AI in Cybersecurity: How ChatGPT is Changing Ethical Hacking Read More »

picoCTF Bookmarklet: Web exploitation

picoCTF Bookmarklet: Web exploitation

picoCTF Bookmarklet: Web exploitation Read More »

Your Ultimate Guide to Subdomain Enumeration

Subfinder: Your Ultimate Guide to Subdomain Enumeration

Subfinder: Your Ultimate Guide to Subdomain Enumeration Read More »

PicoCTF Cookie Monster Secret Recipe writeup

PicoCTF Cookie Monster Secret Recipe writeup

PicoCTF Cookie Monster Secret Recipe writeup Read More »

PicoCTF Unminify Challenge

PicoCTF Unminify Writeup

PicoCTF Unminify Writeup Read More »

picoCTF Webcode Writeup

picoCTF WebDecode Writeup

picoCTF WebDecode Writeup Read More »

picoCTF hashcrack step by step writeup

picoCTF hashcrack step by step writeup Read More »

picoctf head-dump writeup

picoCTF heapdump challenge writeup

picoCTF heapdump challenge writeup Read More »

PicoCTF SSTI 1 challenge

PicoCTF SSTI 1 challenge Read More »

← Previous 1 2 3 Next →
  • Home
  • Blogs
  • Projects
  • About
  • Work
  • Contact

© 2025 AATHIL DUCKY
Security Researcher

  • LinkedIn
  • Github
  • Twitter
  • Instagram