bash — 80×24
 ██████╗████████╗███████╗    ██╗    ██╗██████╗ ██╗████████╗███████╗██╗   ██╗██████╗ ███████╗
██╔════╝╚══██╔══╝██╔════╝    ██║    ██║██╔══██╗██║╚══██╔══╝██╔════╝██║   ██║██╔══██╗██╔════╝
██║        ██║   █████╗      ██║ █╗ ██║██████╔╝██║   ██║   █████╗  ██║   ██║██████╔╝███████╗
██║        ██║   ██╔══╝      ██║███╗██║██╔══██╗██║   ██║   ██╔══╝  ██║   ██║██╔═══╝ ╚════██║
╚██████╗   ██║   ██║         ╚███╔███╔╝██║  ██║██║   ██║   ███████╗╚██████╔╝██║     ███████║
 ╚═════╝   ╚═╝   ╚═╝          ╚══╝╚══╝ ╚═╝  ╚═╝╚═╝   ╚═╝   ╚══════╝ ╚═════╝ ╚═╝     ╚══════╝
#!/usr/bin/env bash
# CTF challenges — solved & explained, when time permits
# by pksec — student in training: CS Diploma HF | Cyber Security Specialist FA
 
export AUTHOR="pksec"
export SCHEDULE="when_time_permits"
export CATEGORIES="web rev crypto forensics pwn misc"
echo "Let's capture some flags." | tee /dev/stdout
6
Writeups
8
CTFs
47
Flags Captured
irregular
Schedule

New writeups — when time permits

CTF challenge writeups with detailed walkthroughs, tools used, and step-by-step solutions. Student life comes first, but the flags keep coming.

$ ls ./writeups

All
Web
Reversing
Crypto
Forensics
Pwn
Misc

$ cat ./about.md

// whoami

Currently in training as a CS Diploma (HF) and Cyber Security Specialist (FA) — passionate about IT security and CTFs.

This blog documents my learning journey — writeups with detailed walkthroughs, from web exploits to reverse engineering and cryptography. All broken down step by step, whenever I find the time between studies.

TryHackMe · HackTheBox

// skills --verbose

Web Exploitation45%
Reverse Engineering30%
Cryptography35%
Forensics40%
Binary Exploitation20%