Securinets 2025 — Lost File
CTF WriteupRansomware-style challenge requiring memory capture analysis and reverse engineering of an encryption tool to recover a deleted key.
Memory Forensics with Volatility 3
WalkthroughA complete beginner-to-intermediate guide to memory forensics using Volatility 3. Covers installation, essential plugins, process analysis, network artifact extraction, and memory-resident malware hunting.
QnQSec 2025 — Masks
CTF WriteupTracing a phishing attack chain from initial email delivery in Outlook to scheduled task persistence using Volatility 3 and AmCache forensics.