top of page
Table of Content


Swamp CTF 2025 - Crypto - Rock my Password Walkthrough
Learn how to reverse-engineer a multi-hashed password from a Swamp CTF challenge using RockYou wordlist and Python scripting.
Akshay Jain
2 min read


Swamp CTF 2025 - OSInt Walkthrough
Swamp CTF OSInt Challenge 1: Party Time! Description: This party house is known for its 3AM outings, but you've gotta work for the...
Akshay Jain
3 min read


The Pyramid of Pain: How to Frustrate Attackers and Strengthen Cyber Defenses
Understanding the Pyramid of Pain is key to effective threat intelligence. Learn how different IOC types affect attackers.
Akshay Jain
3 min read


The 3CX Supply Chain Attack: How a Trusted VoIP Software Became a Cybersecurity Nightmare
Discover how the 3CX supply chain attack compromised thousands of systems by delivering malware.
Akshay Jain
3 min read


Inside the Uber Hack: How MFA Fatigue Led to a Major Cybersecurity Breach
In September 2022, Uber suffered a major cybersecurity breach that sent shockwaves through the industry. The attack exposed internal...
Akshay Jain
3 min read
bottom of page