top of page
Table of Content


Swamp CTF 2025 - Crypto - Rock my Password Walkthrough
Learn how to reverse-engineer a multi-hashed password from a Swamp CTF challenge using RockYou wordlist and Python scripting.
Akshay Jain
2 min read
80 views
1 comment


Swamp CTF 2025 - OSInt Walkthrough
Swamp CTF OSInt Challenge 1: Party Time! Description: This party house is known for its 3AM outings, but you've gotta work for the...
Akshay Jain
3 min read
91 views
1 comment


The Pyramid of Pain: How to Frustrate Attackers and Strengthen Cyber Defenses
Understanding the Pyramid of Pain is key to effective threat intelligence. Learn how different IOC types affect attackers.
Akshay Jain
3 min read
6 views
0 comments


The 3CX Supply Chain Attack: How a Trusted VoIP Software Became a Cybersecurity Nightmare
Discover how the 3CX supply chain attack compromised thousands of systems by delivering malware.
Akshay Jain
3 min read
5 views
0 comments


Inside the Uber Hack: How MFA Fatigue Led to a Major Cybersecurity Breach
In September 2022, Uber suffered a major cybersecurity breach that sent shockwaves through the industry. The attack exposed internal...
Akshay Jain
3 min read
6 views
0 comments
bottom of page