This repository contains my personal writeups for various CTF challenges, virtual machines, and other security exercises. Each writeup includes a detailed step-by-step explanation of how I approached the problem, along with tools, techniques, scripts, and screenshots used in the process.
- Linux & Windows machines
- Binary exploitation
- Reverse engineering
- Web exploitation
- Privilege escalation
- Network exploitation
This project is licensed under the MIT License. See the LICENSE file for details.
⚠️ All content is for educational purposes only. The techniques described are intended for legal, ethical hacking (e.g., CTF competitions, pentesting labs).