
  <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
      <title>C1PH3R</title>
      <link>https://cipher-x-sudo-blog.vercel.app/blog</link>
      <description>Dive into it! xD</description>
      <language>en-us</language>
      <managingEditor>241110@students.au.edu.pk (Muhammad Huzaifa)</managingEditor>
      <webMaster>241110@students.au.edu.pk (Muhammad Huzaifa)</webMaster>
      <lastBuildDate>Sun, 28 Sep 2025 00:00:00 GMT</lastBuildDate>
      <atom:link href="https://cipher-x-sudo-blog.vercel.app/feed.xml" rel="self" type="application/rss+xml"/>
      
  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/cpp-programming-guide</guid>
    <title>C++ Programming Guide - From Basics to Advanced Concepts</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/cpp-programming-guide</link>
    <description>A comprehensive guide to C++ programming covering basic syntax, object-oriented programming, memory management, and advanced concepts with practical examples.</description>
    <pubDate>Sun, 28 Sep 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>cpp</category><category>programming</category><category>tutorial</category><category>coding</category><category>software-development</category>
  </item>

  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/ctfd-docker-setup-guide</guid>
    <title>Setting Up and Running CTFd with Docker: Step-by-Step Guide</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/ctfd-docker-setup-guide</link>
    <description>A comprehensive guide to setting up CTFd (Capture The Flag framework) using Docker. Learn how to install Docker, clone CTFd, and run your own CTF platform with step-by-step commands and screenshots.</description>
    <pubDate>Sun, 28 Sep 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>ctf</category><category>docker</category><category>cybersecurity</category><category>tutorial</category><category>capture-the-flag</category>
  </item>

  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/my-first-blog-post</guid>
    <title>My First Blog Post</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/my-first-blog-post</link>
    <description>Welcome to my blog! This is my first post where I share my thoughts and experiences.</description>
    <pubDate>Sun, 28 Sep 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>blogging</category><category>getting-started</category><category>tutorial</category>
  </item>

  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/pcc-ashfaq-vm-complete</guid>
    <title>PCC CTF - AshfaqVM Complete Reverse Engineering Writeup</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/pcc-ashfaq-vm-complete</link>
    <description>Complete reverse engineering of AshfaqVM - a custom virtual machine with encrypted flag validation. Includes VM architecture analysis, tool development, and algorithm reversal.</description>
    <pubDate>Mon, 27 Jan 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>PCC25-QUAL</category><category>reverse-engineering</category><category>vm</category><category>custom-architecture</category><category>cryptography</category><category>ctf</category>
  </item>

  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/pcc-forensic-tampered</guid>
    <title>PCC CTF - Forensic Tampered Challenge Writeup</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/pcc-forensic-tampered</link>
    <description>Forensic analysis of tampered AI research files using XOR encryption. Recovered the flag by analyzing bash history and finding hidden keys.</description>
    <pubDate>Mon, 27 Jan 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>PCC25-QUAL</category><category>forensics</category><category>cryptography</category><category>ctf</category><category>xor</category><category>bash-history</category>
  </item>

  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/pcc-misc-bash</guid>
    <title>PCC CTF - Bash Challenge Writeup</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/pcc-misc-bash</link>
    <description>Bash challenge with character filtering restrictions. Used parameter expansion and wildcards to bypass filters and execute /readflag.</description>
    <pubDate>Mon, 27 Jan 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>PCC25-QUAL</category><category>misc</category><category>bash</category><category>parameter-expansion</category><category>wildcards</category><category>ctf</category>
  </item>

  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/pcc-misc-inject</guid>
    <title>PCC CTF - Python Injection Challenge Writeup</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/pcc-misc-inject</link>
    <description>Python code injection challenge. Exploited exec() vulnerability by injecting malicious code through password parameter to read the flag.</description>
    <pubDate>Mon, 27 Jan 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>PCC25-QUAL</category><category>misc</category><category>python</category><category>injection</category><category>exec</category><category>ctf</category><category>code-injection</category>
  </item>

  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/pcc-pwn-babys-first-step</guid>
    <title>PCC CTF - Babys First Step ROP Challenge Writeup</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/pcc-pwn-babys-first-step</link>
    <description>ROP challenge demonstrating ret2win technique. Used ROP gadgets to call win function with correct arguments and gain shell access.</description>
    <pubDate>Mon, 27 Jan 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>PCC25-QUAL</category><category>pwn</category><category>rop</category><category>ret2win</category><category>binary-exploitation</category><category>ctf</category>
  </item>

  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/pcc-pwn-pwn-101</guid>
    <title>PCC CTF - Pwn101 Buffer Overflow Challenge Writeup</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/pcc-pwn-pwn-101</link>
    <description>Classic buffer overflow challenge demonstrating memory corruption techniques. Overwrote critical variables to gain shell access.</description>
    <pubDate>Mon, 27 Jan 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>PCC25-QUAL</category><category>pwn</category><category>buffer-overflow</category><category>binary-exploitation</category><category>ctf</category><category>memory-corruption</category>
  </item>

  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/pcc-rev-get-crackinn</guid>
    <title>PCC CTF - Flag Generator Reverse Engineering Writeup</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/pcc-rev-get-crackinn</link>
    <description>Java Spring Boot application reverse engineering challenge. Bypassed ClassFinal obfuscation to analyze license validation and generate valid license keys.</description>
    <pubDate>Mon, 27 Jan 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>PCC25-QUAL</category><category>reverse-engineering</category><category>java</category><category>spring-boot</category><category>classfinal</category><category>aes</category><category>ctf</category>
  </item>

  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/pcc-rev-rop</guid>
    <title>PCC CTF - ROP Reverse Engineering Challenge Writeup</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/pcc-rev-rop</link>
    <description>Reverse engineering challenge disguised as ROP exploitation. Analyzed ROP chain to extract XOR keys and decrypt the flag.</description>
    <pubDate>Mon, 27 Jan 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>PCC25-QUAL</category><category>reverse-engineering</category><category>rop</category><category>xor</category><category>ctf</category><category>binary-analysis</category>
  </item>

  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/pcc-reverse-flag-validator</guid>
    <title>PCC CTF - Reverse Flag Validator Writeup</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/pcc-reverse-flag-validator</link>
    <description>Reverse engineering challenge involving XOR decryption. Analyzed binary to extract encrypted data and decrypt using XOR key to reveal the flag.</description>
    <pubDate>Mon, 27 Jan 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>PCC25-QUAL</category><category>reverse-engineering</category><category>xor</category><category>binary-analysis</category><category>ctf</category><category>static-analysis</category>
  </item>

  <item>
    <guid>https://cipher-x-sudo-blog.vercel.app/blog/pcc-web-l33tspeal</guid>
    <title>PCC CTF - L33tSpeak Web Challenge Writeup</title>
    <link>https://cipher-x-sudo-blog.vercel.app/blog/pcc-web-l33tspeal</link>
    <description>Web application with Local File Inclusion vulnerability. Exploited using PHP filter chains to bypass restrictions and read the flag.</description>
    <pubDate>Mon, 27 Jan 2025 00:00:00 GMT</pubDate>
    <author>241110@students.au.edu.pk (Muhammad Huzaifa)</author>
    <category>PCC25-QUAL</category><category>web</category><category>lfi</category><category>php</category><category>ctf</category><category>filter-chains</category>
  </item>

    </channel>
  </rss>
