CTF Writeups

Forensics, malware analysis, incident response, and more from competitions worldwide.

Ransomware-style challenge requiring memory capture analysis and reverse engineering of an encryption tool to recover a deleted key.

A complete beginner-to-intermediate guide to memory forensics using Volatility 3. Covers installation, essential plugins, process analysis, network artifact extraction, and memory-resident malware hunting.

QnQSec 2025 — Masks

CTF Writeup

Tracing a phishing attack chain from initial email delivery in Outlook to scheduled task persistence using Volatility 3 and AmCache forensics.