ACECTF 2025 WriteUp | LuffySec | STELK_CSCMy team, Stelk_CSC, participated in ACECTF 2025, completing 23 challenges with a variation of categories Cryptography, Forensic, Reverse…4d ago24d ago2
KashiCTF 2025 WriteUp | LuffySec | STELK_CSCMy team, Stelk_CSC, participated in KashiCTF 2025, completing 10 challenges with a variation of categories Cryptography, Forensic, Reverse…6d ago6d ago
EHAXCTF 2025 WriteUp | LuffySec | STELK_CSCMy team, Stelk_CSC, participated in EHAXCTF 2025, completing 4 challenges with a variation of categories Cryptography, Forensic, Reverse…Feb 17Feb 17
BroncoCTF 2025 WriteUp | LuffySec | STELK_CSCMy team, Stelk_CSC, participated in BroncoCTF 2025, completing 12 challenges with a variation of categories Cryptography, Forensic, Reverse…Feb 17Feb 17
BITSCTF 2025 WriteUp | LuffySec | STELK_CSCA couple of days ago, my team, Stelk_CSC, participated in BITSCTF 2025, completing 7 challenges with a variation of categories…Feb 11Feb 11
ECTF 2025 WriteUp | LuffySec | STELK_CSCA couple of days ago, my team, Stelk_CSC, participated in ECTF 2025, completing 16 challenges with a variation of categories Cryptography…Feb 3Feb 3
Menguasai Reconnaissance: Metode lengkap untuk mengumpulkan informasiReconnaissance adalah langkah pertama yang di lakukan oleh pentester untuk mendapatkan sebuah kerentanan di suatu websites, mengumpulkan…Sep 16, 2024Sep 16, 2024
Penjelasan Wifi Deauth Attack dan DemonstrasinyaWifi Deauthentication attack adalah serangan siber yang menargetkan wireless network, serangan ini mengirimkan ribuan packet menuju ke wifi…Jul 5, 2024Jul 5, 2024
Apa itu XSS dan Bagaimana cara saya menemukan puluhan XSS VulnerabilityApa itu XSS ?Jul 4, 2024Jul 4, 2024