تقيم البث المباشر 🤍
Anonymous Poll
50%
ممتاز
30%
جيد جدا
10%
جيد
10%
متوسط
0%
سئ
0%
سئ جدا
0%
مش تعمل بث مباشر تاني 🙂
❤1
الحمدالله 🤍
انا و تيم MindCrafters مركز 28 في 0xL4ugh CTF v5 و من نجاح لي نجاح ان شاء الله
Alhamdulillah 🤍
Proud to share that my team MindCrafters achieved 28th place in 0xL4ugh CTF v5.
Grateful for the teamwork, late nights, and collective mindset that turned challenges into learning wins.
Onward to sharper skills, tougher battles, and higher ranks 🚀🔐
انا و تيم MindCrafters مركز 28 في 0xL4ugh CTF v5 و من نجاح لي نجاح ان شاء الله
Alhamdulillah 🤍
Proud to share that my team MindCrafters achieved 28th place in 0xL4ugh CTF v5.
Grateful for the teamwork, late nights, and collective mindset that turned challenges into learning wins.
Onward to sharper skills, tougher battles, and higher ranks 🚀🔐
❤3
لاسبوع الجاي هنفتح بث نحل في ctfs من pico 🤍
تاريخ البث : يوم الجمعه الساعه 6 بتوقيت مصر
تاريخ البث : يوم الجمعه الساعه 6 بتوقيت مصر
❤6
https://github.com/InfoSecWarrior/Offensive-Payloads/blob/main/Cross-Site-Scripting-XSS-Payloads.txt
GitHub
Offensive-Payloads/Cross-Site-Scripting-XSS-Payloads.txt at main · InfoSecWarrior/Offensive-Payloads
List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications. - InfoSecWarrior/Offensive-Payloads
حابين البث مباشر يكون اي : what you want in a new live stream
Anonymous Poll
27%
Q&N : اساله
73%
Solve CTF : حل تحديات ستي اف
طبعا هيكون الجمعه الساعه 6 بتوقيت مصر 🤍
Of course, it will be on Friday at 6 PM Egypt time 🤍
Of course, it will be on Friday at 6 PM Egypt time 🤍
❤1
الحمدالله 🤍
سعيد جدا و فخور اني بشارك رايتب من اصعب رايتب الي موجودين علي منصه #flagyard الرايتب عباره عن تحدي كريبتو و حاليا مفيش غير 40 انسان حول العالم بس الي قدرو علي حل تحدي
I’m happy to share a new CTF write-up I’ve published on Medium :
“Reduced Collisions” 🧠🔐
In this challenge (Cryptography – FlagYard), I analyzed a custom hash function built on linear algebra and modular arithmetic, then exploited its structure to generate hash collisions.
🔍 What this write-up covers :
Reverse engineering the provided server-side cryptographic logic
Modeling the hash function as a linear system
Applying lattice reduction (LLL algorithm) to recover valid collision vectors
Crafting a working solution to obtain the flag
This challenge was a great exercise in combining theory (linear algebra & lattices) with practical exploitation, which is something I really enjoy about cryptography-focused CTFs.
📖 Full write-up :
https://spider1sec.medium.com/ctf-write-up-reduced-collisions-9373e48adc75
سعيد جدا و فخور اني بشارك رايتب من اصعب رايتب الي موجودين علي منصه #flagyard الرايتب عباره عن تحدي كريبتو و حاليا مفيش غير 40 انسان حول العالم بس الي قدرو علي حل تحدي
I’m happy to share a new CTF write-up I’ve published on Medium :
“Reduced Collisions” 🧠🔐
In this challenge (Cryptography – FlagYard), I analyzed a custom hash function built on linear algebra and modular arithmetic, then exploited its structure to generate hash collisions.
🔍 What this write-up covers :
Reverse engineering the provided server-side cryptographic logic
Modeling the hash function as a linear system
Applying lattice reduction (LLL algorithm) to recover valid collision vectors
Crafting a working solution to obtain the flag
This challenge was a great exercise in combining theory (linear algebra & lattices) with practical exploitation, which is something I really enjoy about cryptography-focused CTFs.
📖 Full write-up :
https://spider1sec.medium.com/ctf-write-up-reduced-collisions-9373e48adc75
❤3