wh1sp3r3d
HomeTeamBlogsSponsorsJoin

Blogs

detailed ctf walkthroughs and security analysis reports.

Exploiting a Custom Crypto Challenge
crypto
2024-12-10
7 min read

Exploiting a Custom Crypto Challenge

A comprehensive walkthrough of identifying and exploiting a timing side-channel vulnerability in a custom authentication protocol, reducing a brute-force search space to milliseconds.

#python#ctf
Emails and Phishing Analysis (Part-1)
email-analysis
2024-08-06
10 min read

Emails and Phishing Analysis (Part-1)

Learn how to tackle malicious emails.

#phishing#blue-teaming
Rust vs Other Programming Languages
rust
2024-08-06
15 min read

Rust vs Other Programming Languages

Compare Rust with popular programming languages like C++, Python, Go, and JavaScript. Learn about performance, safety, and use cases to choose the right language for your project.

#programming#comparison
Web SQL Injection RCE
web
2024-03-15
6 min read

Web SQL Injection RCE

Leveraging a niche SQL injection vector to gain remote code execution on a hardened web server. A deep dive into WAF evasion and PostgreSQL privilege escalation.

#sql-injection#rce

© 2025 wh1sp3r3d. All rights reserved.