writeup
2025 Cyber Apocalypse: Silent Trap
Analyze compromised system through network traffic and memory forensics to uncover malware deployment and credential theft
#htb
#ctf
#forensics
+4 writeup
2025 Cyber Apocalypse: Stealth Invasion
Analyze memory dump of compromised Linux system to uncover malicious Chrome extension and credential theft
#htb
#ctf
#forensics
+4 writeup
2023 Cyber Apocalypse: Extraterrestrial Persistence
Analyze and decode malicious script with systemd persistence mechanism
#htb
#ctf
#forensics
+3