1. Welcome
  2. Introduction
  3. Psi Beta Rho
  4. 1. Fall 24
    1. 1.1. Fundamentals
      1. 1.1.1. 1: Intro to Linux
      2. 1.1.2. 2: Forensics
      3. 1.1.3. 3: Open Source Reverse Engineering
      4. 1.1.4. 4: Intro to Web & Client-Side Security
      5. 1.1.5. 5: HTTP Requests
      6. 1.1.6. 6: Introduction to Cryptography
      7. 1.1.7. 7: Modern Cryptography Basics
    2. 1.2. Web
      1. 1.2.1. 1: Intro to Web & Client-Side Security
      2. 1.2.2. 2: HTTP Requests
      3. 1.2.3. 3: Local File Inclusion
      4. 1.2.4. 4: Advanced Local File Inclusion
      5. 1.2.5. 5: XSS
      6. 1.2.6. 6: XSS
      7. 1.2.7. 7: Writeups
    3. 1.3. Crypto
      1. 1.3.1. 1: Intro to cryptography
      2. 1.3.2. 2: Block Ciphers
      3. 1.3.3. 3: Stream & Block Ciphers
      4. 1.3.4. 4: Modular Arithmetic, DHKE
      5. 1.3.5. 5: RSA
      6. 1.3.6. 6: RSA Attacks
      7. 1.3.7. 7: Digital Signatures & Writeups
    4. 1.4. Rev
      1. 1.4.1. 1: Intro to Reverse Engineering
      2. 1.4.2. 2: Assembly
      3. 1.4.3. 3: Assembly Part 2
      4. 1.4.4. 4: GDB
      5. 1.4.5. 5: Decompilers
    5. 1.5. Pwn
      1. 1.5.1. 1: Intro to Pwn
      2. 1.5.2. 2: Return-Oriented Programming
  5. 2. Winter 25
    1. 2.1. Web
      1. 2.1.1. 1: Basic SQL Injection
      2. 2.1.2. 2: Advanced SQL Injection
      3. 2.1.3. 3: LACTF Challenges
      4. 2.1.4. 4: XSS, CSP
    2. 2.2. Crypto
      1. 2.2.1. 1: Intro to Cryptography/Math
      2. 2.2.2. 2: Modular Arithmetic/RSA
      3. 2.2.3. 3: RSA
      4. 2.2.4. 4: Signatures, Symmetric Cryptography
      5. 2.2.5. 5: PRNGs and Writeups
  6. 3. Spring 25
    1. 3.1. Crypto
      1. 3.1.1. 1: Intro to Cryptography
      2. 3.1.2. 2: Symmetric Cryptography
      3. 3.1.3. 3: Advanced Symmetric Cryptography
    2. 3.2. Rev / Pwn
      1. 3.2.1. 1: Intro to Reverse Engineering
      2. 3.2.2. 2-3: Intro to Assembly
      3. 3.2.3. 4: GDB
    3. 3.3. Web
      1. 3.3.1. 1-2: CSS Exfiltration Attack
      2. 3.3.2. 3: JWT
  7. 4. Resources
    1. 4.1. General
    2. 4.2. Cryptography
    3. 4.3. Web Exploitation
    4. 4.4. Reverse Engineering
    5. 4.5. Binary Exploitation
    6. 4.6. Miscellaneous
      1. 4.6.1. Forensics
      2. 4.6.2. OSINT
      3. 4.6.3. Blockchain
  8. 5. Appendix

Psi Beta Rho Wiki

Forensics

Resources

Tools

Binwalk

https://github.com/ReFirmLabs/binwalk

Steganography

Resources

Tools

Stego Toolkit

https://github.com/DominicBreuker/stego-toolkit

Boxentriq

https://www.boxentriq.com/

zsteg

https://github.com/zed-0xff/zsteg

Stegsolve

https://github.com/zardus/ctf-tools/blob/master/stegsolve/install

Aperi'Solve

https://www.aperisolve.com/

Stegseek

https://github.com/RickdeJager/stegseek