New CTF walkthrough for TryHackMe's RootMe. This is a fun one!
I just published RootMe (CTF Walkthrough) https://medium.com/p/rootme-ctf-walkthrough-efe69ef73510?source=social.tw
#TryHackMe #Cybersecurity #ReverseShell #CTF #PenetrationTesting
I might be a few months late, but I finally found some time to publish my "magnetic_tape" crypto challenge from #NullCon #Berlin #HackIM #CTF 2025:
https://github.com/OOTS/magnetic_tape
I included the source code (was published anyway during the CTF), my own solution, my own #writeup, and some internal files (#Dockerfile, docker-compose, minimal #python #unittests).
Also: #NullCon #Goa #HackIM #CTF 2026 is happening in a few days: https://ctf.nullcon.net
Go check it out!
If there are any pwners out there, maybe try this shellcode challenge that I wrote for a seminar https://pst.moe/paste/bduwdn
Not sure if this is pwnable in its current form though. I didn't do the math 🫠 #pwn #ctf
Yesterday I took a part in #PascalCTF.
Suddenly got invitation from a friend and joined their team. We spent ~4 hours and proudly took the 281st place out of 855 teams 😁
I'm not really a hacker so it was my first official #CTF but it was quite interesting! The problems were rather basic but very diverse: we had to hack a binary, to decrypt a password, to perform some injections into JS, persuade LLMs to reveal a password, and even geoguess a location using a photo.
And of course we had traditional pizza and coca cola!
Liked the process, will do that again 🙂
I decided to dust off some of my dormant pentesting skills. I picked up some Hack The Box, and after several rooted boxes I've now reached the Hacker rank. 
Binary patching in ghidra in three easy steps:
1) Clear ghidra's idea of what the bytes are
2) Inspect the raw bytes and plan with what to overwrite
3) Overwrite e.g. with NOP and see ghidra eliminate an if-clause
#ctf #cybersecurity #ghidra #binaryreverseengineering #patch
It's official.
#RomHack bẏtes launches today, kicking off a new series of technical meetups that lead to #RomHack Camp 2026.
This event isn't just another gathering; it's a space for the community to share research and explore the "how" of #hacking, all well before September.
Bẏtes will guide the way toward Flaminio Village.
Now, it's your turn:
what topics should shape the upcoming stops on this journey?
Share your ideas in the comments.
Let's craft this roadmap, linking the pieces—one byte at a time
In the first bẏtes the fibonhack team presents the #CTF created for RomHack Camp and walks through how it was designed, built and run, sharing lessons learned along the way.
What are the challenges behind building and running a CTF project?
We will talk about this and more at the first RomHack bẏtes
https://romhack.io/bytes