┌─────────────────────────────────────────────────────────────┐
│ "Security is not a product, but a process of learning, │
│ breaking, understanding, and sharing." │
└─────────────────────────────────────────────────────────────┘
CyberSecurity-Writeups/
│
├── Reverse-Engineering/
│ │
│ ├── Reversing x86/
│ └── CTFs/
│ └── Solving the jeFF0Falltrades Crackme/
│
├── Web-Security/
│ │
│ ├── XSS/
│ │ └── README.md # XSS Exploitation Complete Guide
│ ├── CTFs/ # CTF writeups (coming soon)
│ │
│ └── (other web vulns coming soon)
│
└── assets/
MIT License - See LICENSE for details. Contributions welcome via issues and pull requests. Educational use encouraged. Attribution appreciated.
██████╗ ██╗ ██████╗ ████████╗ ██████╗
██╔══██╗██║ ██╔═══██╗╚══██╔══╝██╔═══██╗
██████╔╝██║ ██║ ██║ ██║ ██║ ██║
██╔═══╝ ██║ ██║ ██║ ██║ ██║ ██║
██║ ███████╗╚██████╔╝ ██║ ╚██████╔╝
╚═╝ ╚══════╝ ╚═════╝ ╚═╝ ╚═════╝
*Last Updated: 2026-01-19*