From Nusantara to the World, We Capture Every Flag.

Rookie hackers on a mission to learn, fail, and hack smarter. We explore the art of cybersecurity with curiosity and teamwork, turning mistakes into lessons and lessons into victories, one flag at a time.

Latest Posts

Insights and writeups from our team

Security1/1/2026

From Weakness to CVE: Understanding How Bugs Become Global Vulnerabilities

The path from discovering a software flaw to classifying it under CVE and CWE. ...

Read More
Security1/1/2026

Bug Bounty Hunting: Web Vulnerability (SQL injection)

SQL Injection (SQLi) is a critical web security vulnerability that allows attackers to manipulate SQL queries and gain unauthorized access to databas...

Read More
Security1/1/2026

Breaking Down a Real Web Exploitation Case: From Recon to CVE & Remediation

A practical, non-exploitative walkthrough of a web vulnerability — how we find it, map it to OWASP and CVE, and harden systems. ...

Read More
Security1/1/2026

Uncovering Local File Inclusion Vulnerabilities: A Practical Approach to Path Traversal Hunting

Local File Inclusion (LFI) is one of the most common yet impactful vulnerabilities in modern web applications. It arises when user-supplied input is ...

Read More