“People are all alike. They love to pretend they’re different.”
— Elliot Alderson, Mr. Robot
This repo is my vault of writeups — event runs, practice challenges, and random puzzles I broke at weird hours.
Expect raw artifacts, scripts, recovered files, and the mental notes that actually mattered.
- Reverse Engineering — binaries, patching, decompiles.
- Crypto — ciphers, encoding chains, and brute tricks.
- Web — auth, flows, injections, and weird HTTP logic.
- Forensics — images, dumps, memory and timeline digging.
- OSINT — footprinting, crumbs, and social breadcrumbs.
- Other — boot2root, CTF-like multi-step challenges, misc labs and anything that doesn’t fit above.
All folders contain artifacts (images, scripts, dumps) alongside writeups — some neat, some messy. Nothing useful gets deleted.
“The world is a dangerous place, not because of those who do evil, but because of those who look on and do nothing.”
— Elliot Alderson
- Open top-level folders (event or collection names).
- Inside each folder you’ll usually find per-challenge subfolders. Each challenge folder should contain a
README.md. Start there. - If a challenge folder has scripts or
requirements.txt, run them in an isolated env to reproduce results.
If a folder lacks a README.md, check for files named flag.txt, decoded.*, fixed.*, or *.py — those are the solved outputs and helper scripts.
This project is released under the terms in LICENSE.md. See NOTICE.md for attributions and credits.
“If you can hack the time, you can hack the game.”
— Elliot Alderson
Questions, collabs or weird binaries: contact@them3chanik.com