Achievement Unlocked: Made it into the Wall of Fame at #9 with one first 🩸 at "Eschaton CTF 2026" with Team RootRunners! #Hacking #CTF #EschatonCTF
This week's session puts an exciting new twist on the humble CTF: this time, it's an escape room!
Join us in C27 on Wednesday to solve puzzles around the room in order to "escape"...
#CTF

New CTF walkthrough for TryHackMe's RootMe. This is a fun one!

I just published RootMe (CTF Walkthrough) https://medium.com/p/rootme-ctf-walkthrough-efe69ef73510?source=social.tw

#TryHackMe #Cybersecurity #ReverseShell #CTF #PenetrationTesting

RootMe (CTF Walkthrough)

A TryHackMe Lab

Medium

I might be a few months late, but I finally found some time to publish my "magnetic_tape" crypto challenge from #NullCon #Berlin #HackIM #CTF 2025:

https://github.com/OOTS/magnetic_tape

I included the source code (was published anyway during the CTF), my own solution, my own #writeup, and some internal files (#Dockerfile, docker-compose, minimal #python #unittests).

Also: #NullCon #Goa #HackIM #CTF 2026 is happening in a few days: https://ctf.nullcon.net
Go check it out!

GitHub - OOTS/magnetic_tape: Source code and solution of the magnetic_tape challenge from NullCon Berlin HackIM CTF 2025

Source code and solution of the magnetic_tape challenge from NullCon Berlin HackIM CTF 2025 - OOTS/magnetic_tape

GitHub

If there are any pwners out there, maybe try this shellcode challenge that I wrote for a seminar https://pst.moe/paste/bduwdn

Not sure if this is pwnable in its current form though. I didn't do the math 🫠 #pwn #ctf

bduwdn · pst.moe

🚩 The #Insomnihack CTF ticketing is officially live!
Take part in the largest #CTF in Switzerland on March 20.
Challenge yourself, compete with top teams, and try to win the prize
Get your ticket now: https://insomnihack.ch/?utm_source=mastodon&utm_medium=image&utm_campaign=Insomnihack2026&utm_content=0202
#InsomniHack #Cybersecurity #Infosec #INSO2026 #CaptureTheFlag

Yesterday I took a part in #PascalCTF.

Suddenly got invitation from a friend and joined their team. We spent ~4 hours and proudly took the 281st place out of 855 teams 😁

I'm not really a hacker so it was my first official #CTF but it was quite interesting! The problems were rather basic but very diverse: we had to hack a binary, to decrypt a password, to perform some injections into JS, persuade LLMs to reveal a password, and even geoguess a location using a photo.

And of course we had traditional pizza and coca cola!

Liked the process, will do that again 🙂

PascalCTF 2026

I decided to dust off some of my dormant pentesting skills. I picked up some Hack The Box, and after several rooted boxes I've now reached the Hacker rank. 

https://labs.hackthebox.com/achievement/badge/37182/215

#hackthebox #hacking #pentesting #ctf

Binary patching in ghidra in three easy steps:
1) Clear ghidra's idea of what the bytes are
2) Inspect the raw bytes and plan with what to overwrite
3) Overwrite e.g. with NOP and see ghidra eliminate an if-clause

#ctf #cybersecurity #ghidra #binaryreverseengineering #patch

It's official.
#RomHack bẏtes launches today, kicking off a new series of technical meetups that lead to #RomHack Camp 2026.

This event isn't just another gathering; it's a space for the community to share research and explore the "how" of #hacking, all well before September.
Bẏtes will guide the way toward Flaminio Village.

Now, it's your turn:
what topics should shape the upcoming stops on this journey?
Share your ideas in the comments.
Let's craft this roadmap, linking the pieces—one byte at a time

In the first bẏtes the fibonhack team presents the #CTF created for RomHack Camp and walks through how it was designed, built and run, sharing lessons learned along the way.

What are the challenges behind building and running a CTF project?
We will talk about this and more at the first RomHack bẏtes
https://romhack.io/bytes