CTF Writeups

Forensics, malware analysis, incident response, and more from competitions worldwide.

Investigation of a malicious npm package and its Go-based payload through Windows disk image analysis.

A complete beginner-to-intermediate guide to memory forensics using Volatility 3. Covers installation, essential plugins, process analysis, network artifact extraction, and memory-resident malware hunting.