by Ruwithma
Documenting exploits, vulnerabilities, and capture the flag solutions with detailed technical writeups.
Exploiting authentication bypass through SQL injection vulnerabilities
Finding and exploiting cross-site scripting in a live application
XSS, SQLi, CSRF
Classical & modern crypto
PWN, reverse engineering
Digital forensics & OSINT