Categories
Tags
8ksec 8ksec.io aidl android anti-debug anti-frida anti-hook APK broadcast-receiver bypass CC certification config content-provider CTF ctf cybersecurity cybertalents deep-links deeplink dex dexclassloader dylib dynamic-analysis dynamic-loading emulator exam exploitation file-encryption flutter frida ghidra hextree.io hook hooking http-security ios ipc ISC2 jailbreak-detection Kali kiosk-mode logic-bug mobile mobile-exploitation native network-interception pentest plugin privacy proxy-detection rce reverse-engineering runtime script security smali sql-injection static-analysis swift tls-pinning token-extraction url-parsing url-scheme vulnerability web webview writeup WSL2
Brod & Co. — Android CTF Writeup (BrunnerCTF 2025)
Reverse engineering Brod & Co. from BrunnerCTF 2025: Flutter + native analysis, Frida↔Ghidra mapping, overflow confirmation, and pulling the flag via util_func_c(0x1337).
774 words
|
4 minutes

Arab Wargames 2025 - Android Challenges Writeup
Comprehensive writeup for two Android reverse engineering challenges: Sacred Myth and Double Trouble
2414 words
|
12 minutes

Aswan CTF Qualification 2025 Web Writeups
Aswan CTF Qualification 2025 Web Writeups
1265 words
|
6 minutes

CyberAnime Web Challenge Writeup
This writeup details the steps taken to solve the CyberAnime Web Challenge on Cybertalents.
286 words
|
1 minutes
