🐱
0xFUN CTF 2026: Global Jeopardy-Style Cybersecurity Challenge

0xFUN CTF 2026: Global Jeopardy-Style Cybersecurity Challenge

0xFUN CTF 2026 is a 48-hour online Capture The Flag competition that pits teams and individual players against a series of mixed-difficulty cybersecurity challenges across web exploitation, reverse engineering, cryptography, forensics, OSINT and more. Built to be both approachable for beginners and deep enough to challenge intermediate competitors, this event emphasizes hands-on learning, creative problem-solving, and practical exploitation techniques in a high-pressure, competitive format that mirrors real offensive security work.

NICC 2026 CTF - Namibia International Cybersecurity Conference  Write-Up

NICC 2026 CTF - Namibia International Cybersecurity Conference Write-Up

This write-up documents my full solution path for the NICC CTF 2026, covering all challenge categories including OSINT, Web, Reverse Engineering, PWN, and Industrial Control Systems (ICS). Rather than focusing only on final answers, this write-up emphasizes methodology, attacker mindset, and real-world exploitation logic -from open-source intelligence gathering and web vulnerability chaining to low-level binary analysis and Modbus/TCP memory disclosure in simulated industrial environments.

SWIMMER CTF OSINT Writeup: Advanced Image Forensics, AI Decoy Detection, and Real-World Attributionon open source intelligence.

SWIMMER CTF OSINT Writeup: Advanced Image Forensics, AI Decoy Detection, and Real-World Attributionon open source intelligence.

This writeup presents a comprehensive solution to the SWIMMER OSINT CTF, covering multiple challenges involving image verification,social media osint, AI-generated decoy detection, metadata analysis, geolocation, and attribution. The investigation demonstrates how modern OSINT challenges intentionally exploit overreliance on EXIF data and visual assumptions by embedding AIGC fingerprints and misleading context. By combining automated metadata extraction, AI provenance detection, reverse image search, and human-centric reasoning, the correct signals were isolated and verified. This case study highlights practical OSINT techniques required to operate effectively in an era of synthetic media and increasingly deceptive open-source artifacts.

NahamCon Winter CTF

NahamCon Winter CTF

NAHAMCON Winter CTF 2025 kicked off on December 17th at 12:00 PM Pacific Time, bringing together the global security community for a fast-paced, high-signal Capture The Flag competition. With a strong focus on real-world offensive and defensive security skills, the event challenged participants across multiple domains while rewarding precision, speed, and depth of understanding. The competition featured a $2,000+ prize pool, including rewards for the top three teams and a bonus for the first team to complete The Mission, backed by industry sponsors such as Flare Academy, Project-Discovery, YesWeHack, Gray Swan, Snyk, and HackingHub.

P3rf3ctr00t CTF 2025-WRITEUP

P3rf3ctr00t CTF 2025-WRITEUP

In this writeup I walk you through my journey during P3rf3ctr00t CTF 2025 — a 48-hour capture-the-flag marathon organized by p3rf3ctr00t. I break down each challenge I solved: the approach, the mistakes, the wins, and the lessons learned. Whether you’re a first-time CTFer or a seasoned hacker, this writeup aims to give you insight into the problem-solving mindset, the tools, and the strategies that turned chaos into flags.