From Nusantara to the World, We Capture Every Flag.
Rookie hackers on a mission to learn, fail, and hack smarter. We explore the art of cybersecurity with curiosity and teamwork, turning mistakes into lessons and lessons into victories, one flag at a time.
Latest Posts
Insights and writeups from our team
From Weakness to CVE: Understanding How Bugs Become Global Vulnerabilities
The path from discovering a software flaw to classifying it under CVE and CWE. ...
Read MoreBug Bounty Hunting: Web Vulnerability (SQL injection)
SQL Injection (SQLi) is a critical web security vulnerability that allows attackers to manipulate SQL queries and gain unauthorized access to databas...
Read MoreBreaking Down a Real Web Exploitation Case: From Recon to CVE & Remediation
A practical, non-exploitative walkthrough of a web vulnerability — how we find it, map it to OWASP and CVE, and harden systems. ...
Read MoreUncovering Local File Inclusion Vulnerabilities: A Practical Approach to Path Traversal Hunting
Local File Inclusion (LFI) is one of the most common yet impactful vulnerabilities in modern web applications. It arises when user-supplied input is ...
Read More