You will find all the challenges, its respective files, and my writeup screenshots in this repository. Please use it only for educational and ethical cybersecurity learning purposes only.
Disclaimer Files shared through this repository is intended strictly for educational and ethical cybersecurity learning purposes. All files, techniques, and information referenced here are provided solely to help readers understand and practice legitimate CTF-style challenges. Any misuse of the knowledge, tools, or data shared in this repository or write-up is strictly discouraged and not supported in any way. Readers are expected to follow ethical guidelines, respect applicable laws, and ensure that any testing is performed only on systems they own or have explicit permission to assess. By continuing, you acknowledge and agree to use this information responsibly.
A variety of online and offline resources including tools, blogs, articles, AI assistants, documents, videos, and websites were used to solve these challenges and creating writeup, and full credit goes to the respective creators of those resources. If you notice any errors, sensitive information, or inaccuracies in this repository or write-up, please let me know.