<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <link href="https://www.1337sheets.com/feed/atom" rel="self" type="application/atom+xml" />
  <title><![CDATA[1337 Sheets]]></title>
  <subtitle type="html"><![CDATA[1337 or Elite, The Cybersecurity write-ups for the true cyber e1ite! Offsec, Hack The Box, and more🕵️‍♂️ Whether you&#39;re diving into the latest exploits or sharpening your skills 🛠️, we&#39;ve got you covered.

Open to acquisitions. More more info email us at contact@1337sheets.com]]></subtitle>
  <updated>2026-03-01T17:00:00Z</updated>
  <author>
    <name>Preston Zen | OSCE³</name>
  </author>
  
  <author>
    <name>Shuvro Hawk</name>
  </author>
  
  <author>
    <name>Heaven</name>
  </author>
  
  <logo>https://static.quail.ink/media/58ndvuo0d.webp</logo>
  <icon>https://static.quail.ink/media/58ndvuo0d.webp</icon>
  <id>https://https://www.1337sheets.com</id>
  <generator uri="https://quaily.com" version="1.0">Quaily</generator>
  
  <entry>
    <title><![CDATA[Hack The Box - Season 10 HTB Pirate Writeup - Hard- Weekly - Feb 28th, 2026]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-season-ten-htb-pirate-writeup-hard-weekly-feb" />
    <id>https://www.1337sheets.com/p/hack-the-box-season-ten-htb-pirate-writeup-hard-weekly-feb#16336</id>
    <author>
      <name>Heaven</name>
    </author>
    <published>2026-03-01T17:00:00Z</published>
    <updated>2026-03-01T17:00:00Z</updated>
    
    <summary>
      <![CDATA[ Pirate is a Hard-rated Windows Active Directory machine that involves a complex multi-step attack chain spanning two machines in different network segmen...cks. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Hack The Box - Season 10 HTB Interpreter  Writeup - Meduim - Weekly - Feb 21th, 2026]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-season-ten-htb-interpreter-writeup-medium-weekly-february-twenty-first" />
    <id>https://www.1337sheets.com/p/hack-the-box-season-ten-htb-interpreter-writeup-medium-weekly-february-twenty-first#16171</id>
    <author>
      <name>Heaven</name>
    </author>
    <published>2026-02-21T07:35:00Z</published>
    <updated>2026-02-21T07:35:00Z</updated>
    
    <summary>
      <![CDATA[ An intruder found a hospital's outdated digital gateway wide open, slipped in without credentials, and landed as a low-level worker. Inside, they discove...hing ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Hack The Box - Season 10 HTB WingData Writeup - Easy - Weekly - Feb 14th, 2026]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-season-ten-htb-wingdata-writeup-easy-weekly-feb-fourteenth" />
    <id>https://www.1337sheets.com/p/hack-the-box-season-ten-htb-wingdata-writeup-easy-weekly-feb-fourteenth#16063</id>
    <author>
      <name>Heaven</name>
    </author>
    <published>2026-02-14T06:15:00Z</published>
    <updated>2026-02-14T06:15:00Z</updated>
    
    <summary>
      <![CDATA[ Two doors stand open; one hides deeper paths. The mind probes, finds the unseen gate, speaks in the tongue of Lua, and steps inside without knocking. Fro...act. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Hack The Box - Season 10 HTB Pterodactyl Writeup - Meduim - Weekly - Feb 07th, 2026]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-season-ten-htb-pterodactyl-writeup-medium-weekly-february-seventh" />
    <id>https://www.1337sheets.com/p/hack-the-box-season-ten-htb-pterodactyl-writeup-medium-weekly-february-seventh#15916</id>
    <author>
      <name>Heaven</name>
    </author>
    <published>2026-02-07T03:00:00Z</published>
    <updated>2026-02-07T03:00:00Z</updated>
    
    <summary>
      <![CDATA[ Pterodactyl is a medium-difficulty Linux machine featuring the Pterodactyl Panel, a popular open-source game server management platform. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[1337sheets hiring]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/leet-sheets-hiring" />
    <id>https://www.1337sheets.com/p/leet-sheets-hiring#15847</id>
    <author>
      <name>Heaven</name>
    </author>
    <published>2026-02-04T13:28:52Z</published>
    <updated>2026-02-04T13:28:52Z</updated>
    
    <summary>
      <![CDATA[ Join our growing team of cybersecurity researchers and content creators. We need skilled professionals who can craft world-class writeups, technical repo...ond. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Hack The Box - Season 10 HTB FACTS Writeup - Easy - Weekly - January 31th, 2026]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-season-htb-facts-writeup-easy-weekly-january" />
    <id>https://www.1337sheets.com/p/hack-the-box-season-htb-facts-writeup-easy-weekly-january#15850</id>
    <author>
      <name>Heaven</name>
    </author>
    <published>2026-01-31T03:56:00Z</published>
    <updated>2026-01-31T03:56:00Z</updated>
    
    <summary>
      <![CDATA[ Facts is an Easy-rated Linux machine featuring a Ruby on Rails CMS called Camaleon. The attack path involves exploiting an Insecure Direct Object Referen...ess. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Hack The Box - Season 9 HTB Gavel Writeup - Medium - Weekly - November 29th, 2025]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-season-nine-htb-gavel-writeup-medium-weekly-november-th" />
    <id>https://www.1337sheets.com/p/hack-the-box-season-nine-htb-gavel-writeup-medium-weekly-november-th#14279</id>
    <author>
      <name>Heaven</name>
    </author>
    <published>2025-11-29T08:30:00Z</published>
    <updated>2025-11-29T08:30:00Z</updated>
    
    <summary>
      <![CDATA[ The auctioneer's gavel struck midnight. Behind velvet curtains, whispered bids concealed darker trades. One desperate bidder discovered the house's secre...old. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Hack The Box - HTB Mirage Writeup - Hard- Season 8 Weekly - July 19th,  2025]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-htb-mirage-writeup-hard-season-weekly-july" />
    <id>https://www.1337sheets.com/p/hack-the-box-htb-mirage-writeup-hard-season-weekly-july#11437</id>
    <author>
      <name>Heaven</name>
    </author>
    <published>2025-07-20T16:17:42Z</published>
    <updated>2025-07-20T16:17:42Z</updated>
    
    <summary>
      <![CDATA[ In a realm of open ports and hidden shares, legacy protocols are quietly retired as Kerberos emerges to restore balance—a whisper of modern security amid...ows. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Hack The Box - HTB Voleur Writeup - Medium - Season 8 Weekly - July 5th 2025]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-htb-voleur-writeup-medium-season-weekly-july" />
    <id>https://www.1337sheets.com/p/hack-the-box-htb-voleur-writeup-medium-season-weekly-july#11221</id>
    <author>
      <name>Heaven</name>
    </author>
    <published>2025-07-06T04:33:41Z</published>
    <updated>2025-07-06T04:33:41Z</updated>
    
    <summary>
      <![CDATA[ In the realm of VOLEUR.HTB, the seeker wields Kerberos tickets and agile reconnaissance like a Zen master, revealing hidden keys and service account whis...ent. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Hack The Box - HTB Rusty Key Writeup - Hard - Season 8 Weekly - June 28th, 2025]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-htb-rusty-key-writeup-hard-season-weekly-june" />
    <id>https://www.1337sheets.com/p/hack-the-box-htb-rusty-key-writeup-hard-season-weekly-june#11155</id>
    <author>
      <name>Heaven</name>
    </author>
    <published>2025-07-01T00:31:52Z</published>
    <updated>2025-07-01T00:31:52Z</updated>
    
    <summary>
      <![CDATA[ In the digital maze, silent ports and cryptic commands reveal the art of trust and exploration—a journey of stealth and mastery that turns technical deta...ath. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[CVE-2022-29517 - Devil’s Lanmine: Lansweeper Exploit Explained]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/lansweeper-directory-dropper-cve" />
    <id>https://www.1337sheets.com/p/lansweeper-directory-dropper-cve#10771</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-06-10T19:22:11Z</published>
    <updated>2025-06-10T19:22:11Z</updated>
    
    <summary>
      <![CDATA[ In a realm of structured code, one careless string opens a hidden door; unsanitized names invite unrest, reminding us that even precise order harbors the...aos. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[HTB - Operation Blackout - PWN - Power Greed]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/htb-operation-blackout-pwn-power-greed" />
    <id>https://www.1337sheets.com/p/htb-operation-blackout-pwn-power-greed#10453</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-05-25T22:48:59Z</published>
    <updated>2025-05-25T22:48:59Z</updated>
    
    <summary>
      <![CDATA[ The canary sings its random tune, a guard against the overflow's hungry maw. But in 'Power Greed,' true mastery lies not in avoiding the pad, but in know... it. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Hack The Box Hardware Exploitation Track: Secure Digital]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-hardware-exploitation-track-secure-digital" />
    <id>https://www.1337sheets.com/p/hack-the-box-hardware-exploitation-track-secure-digital#10385</id>
    <author>
      <name>Shuvro Hawk</name>
    </author>
    <published>2025-05-23T22:58:00Z</published>
    <updated>2025-05-23T22:58:00Z</updated>
    
    <summary>
      <![CDATA[ Every pin tells a story, every signal hides a flag. What if a microSD card could spill its secrets — not through software, but through bare electrical si...ata. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Hack The Box Hardware Exploitation Track: Low Logic]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-hardware-exploitation-track-low-logic" />
    <id>https://www.1337sheets.com/p/hack-the-box-hardware-exploitation-track-low-logic#10386</id>
    <author>
      <name>Shuvro Hawk</name>
    </author>
    <published>2025-05-23T07:37:00Z</published>
    <updated>2025-05-23T07:37:00Z</updated>
    
    <summary>
      <![CDATA[ A challenge from HTB Hardware Exploitations track. Low Logic, tasked you with reverse-engineering a simple microchip using a circuit diagram and binary i...ens. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Hack The Box Hardware Exploitation Track: Debugging Interface]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-hardware-exploitations-track-debugging-interface" />
    <id>https://www.1337sheets.com/p/hack-the-box-hardware-exploitations-track-debugging-interface#10384</id>
    <author>
      <name>Shuvro Hawk</name>
    </author>
    <published>2025-05-22T17:37:00Z</published>
    <updated>2025-05-22T17:37:00Z</updated>
    
    <summary>
      <![CDATA[ A story of signal decoding and low-level insight. Starting with a simple .sal file, a curious mind dives into the world of embedded systems, peeling back...lag. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Hack The Box - Planning - May 10th]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/hack-the-box-planning-may-tenth" />
    <id>https://www.1337sheets.com/p/hack-the-box-planning-may-tenth#10129</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-05-10T22:16:16Z</published>
    <updated>2025-05-10T22:16:16Z</updated>
    
    <summary>
      <![CDATA[ A journey from web enumeration to root, showing how seemingly simple credentials and version vulnerabilities can cascade into full system compromise. The...rol. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Integrating Quantum Computing with AI and Cybersecurity: A Quantum Pathfinding and Cryptanalysis Framework]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/integrating-quantum-computing-with-ai-and-cybersecurity-a-quantum-pathfinding-and-cryptanalysis-framework" />
    <id>https://www.1337sheets.com/p/integrating-quantum-computing-with-ai-and-cybersecurity-a-quantum-pathfinding-and-cryptanalysis-framework#9940</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-05-04T17:30:01Z</published>
    <updated>2025-05-04T17:30:01Z</updated>
    
    <summary>
      <![CDATA[ A revolutionary fusion of quantum computing and AI proposes using quantum superposition and qutrit-based circuits to simultaneously explore multiple atta...ods. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[HTB Write-Up: Scepter]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/htb-write-up-scepter" />
    <id>https://www.1337sheets.com/p/htb-write-up-scepter#9938</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-04-27T08:34:43Z</published>
    <updated>2025-04-27T08:34:43Z</updated>
    
    <summary>
      <![CDATA[ A Windows DC hack where NFS exposes sensitive PFX/cert files. Through cracking and crafting certificates, domain access was achieved. The key wasn't just...ion. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[When WiFi Sees: The Rise of Invisible Vision]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/wifi-can-turn-into-a-camera-with-ai" />
    <id>https://www.1337sheets.com/p/wifi-can-turn-into-a-camera-with-ai#9656</id>
    <author>
      <name>Shuvro Hawk</name>
    </author>
    <published>2025-04-18T19:37:00Z</published>
    <updated>2025-04-18T19:37:00Z</updated>
    
    <summary>
      <![CDATA[ In the cosmic choreography of unseen waves, WiFi murmurs softly, tracing human shapes from silent shadows, undisturbed by walls or darkness. Researchers,...een. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[HTB Write-Up: Haze]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/htb-write-up-haze" />
    <id>https://www.1337sheets.com/p/htb-write-up-haze#9357</id>
    <author>
      <name>Heaven</name>
    </author>
    <published>2025-04-10T20:54:04Z</published>
    <updated>2025-04-10T20:54:04Z</updated>
    
    <summary>
      <![CDATA[ A misty journey through digital realms, where ports whisper secrets and certificates unveil hidden paths. In this haze, one must navigate the fog of prot...ine. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[The Code of Magic: Technology as Modern Sorcery]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/the-code-of-magic-technology-as-modern-sorcery" />
    <id>https://www.1337sheets.com/p/the-code-of-magic-technology-as-modern-sorcery#9356</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-04-09T19:00:01Z</published>
    <updated>2025-04-09T19:00:01Z</updated>
    
    <summary>
      <![CDATA[ From ancient scribes to modern coders, the power of symbols endures. Writing, once a divine gift, now manifests as programming – both bridging worlds thr...kes. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Under the Hood of OpenAI’s Deep Research System]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/under-the-hood-of-openai-deep-research-system" />
    <id>https://www.1337sheets.com/p/under-the-hood-of-openai-deep-research-system#9303</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-04-08T12:10:01Z</published>
    <updated>2025-04-08T12:10:01Z</updated>
    
    <summary>
      <![CDATA[ Deep Research: ChatGPT's autonomous researcher, weaving through web's labyrinth. A digital detective, it queries, reads, analyzes, and synthesizes - craf...ies. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[How Frequency Jamming Works: Understanding Deliberate Signal Interference]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/how-frequency-jamming-works-understanding-deliberate-signal-interference" />
    <id>https://www.1337sheets.com/p/how-frequency-jamming-works-understanding-deliberate-signal-interference#9301</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-04-07T11:40:01Z</published>
    <updated>2025-04-07T11:40:01Z</updated>
    
    <summary>
      <![CDATA[ In the cosmic dance of waves, some shout to silence others. A deliberate cacophony drowns the whispers of connection, leaving only static in its wake. Ye...ion. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Comparing Face Swap Models: BlendSwap, Ghost, InSwapper, SimSwap, and UniFace]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/comparing-face-swap-models-blendswap-ghost-inswapper-simswap-uniface" />
    <id>https://www.1337sheets.com/p/comparing-face-swap-models-blendswap-ghost-inswapper-simswap-uniface#9266</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-04-04T22:28:01Z</published>
    <updated>2025-04-04T22:28:01Z</updated>
    
    <summary>
      <![CDATA[ Face swap models dance a delicate tango between identity and appearance, each with its own unique flair. From BlendSwap's artistic blend to Ghost's spect...nce. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Best NVIDIA GPUs for VRAM-per-Dollar (High-VRAM AI Workloads)]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/best-nvidia-gpus-for-vram-per-dollar-high-vram-ai-workloads" />
    <id>https://www.1337sheets.com/p/best-nvidia-gpus-for-vram-per-dollar-high-vram-ai-workloads#9102</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-04-04T05:30:03Z</published>
    <updated>2025-04-04T05:30:03Z</updated>
    
    <summary>
      <![CDATA[ Memory is the key, but don't forget the dance of dollars. Old warriors may surprise you, while new titans flex. Choose wisely, for in unity, there is str...eat. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Integrating Causal Reasoning and Reinforcement Learning for Enhanced Cybersecurity Decision-Making]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/integrating-causal-reasoning-and-reinforcement-learning-for-enhanced-cybersecurity-decision-making" />
    <id>https://www.1337sheets.com/p/integrating-causal-reasoning-and-reinforcement-learning-for-enhanced-cybersecurity-decision-making#9065</id>
    <author>
      <name>Shuvro Hawk</name>
    </author>
    <published>2025-04-03T05:29:03Z</published>
    <updated>2025-04-03T05:29:03Z</updated>
    
    <summary>
      <![CDATA[ Combining causal reasoning with reinforcement learning offers a powerful new approach to cybersecurity, reducing false positives, improving anomaly detec...ats. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[The Role of AI in Predicting Zero-Day Vulnerabilities]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/the-role-of-ai-in-predicting-zero-day-vulnerabilities" />
    <id>https://www.1337sheets.com/p/the-role-of-ai-in-predicting-zero-day-vulnerabilities#9058</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-04-01T04:52:03Z</published>
    <updated>2025-04-01T04:52:03Z</updated>
    
    <summary>
      <![CDATA[ AI flips the script on zero-day vulnerabilities, transforming cybersecurity from reactive to proactive. By mining patterns in the digital realm, AI becom...ode. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Machine Learning for Social Engineering Attack Detection]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/machine-learning-for-social-engineering-attack-detection" />
    <id>https://www.1337sheets.com/p/machine-learning-for-social-engineering-attack-detection#9056</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-03-31T03:43:00Z</published>
    <updated>2025-03-31T03:43:00Z</updated>
    
    <summary>
      <![CDATA[ As AI empowers social engineering attacks with uncanny realism, the cybersecurity battlefield evolves. Deepfakes and AI-generated content blur truth, dem...ion. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[AI-Powered Malware and the Evolution of Ransomware: Implications for the Future of Cybersecurity]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/ai-powered-malware-and-the-evolution-of-ransomware-implications-for-the-future-of-cybersecurity" />
    <id>https://www.1337sheets.com/p/ai-powered-malware-and-the-evolution-of-ransomware-implications-for-the-future-of-cybersecurity#9055</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-03-30T03:20:01Z</published>
    <updated>2025-03-30T03:20:01Z</updated>
    
    <summary>
      <![CDATA[ In the digital underworld, AI has become the alchemist's stone, transmuting simple ransomware into a golden goose of cybercrime. As malware gains sentien...ode? ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Safeguarding Image Data in Enterprise AI Services]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/safeguarding-image-data-in-enterprise-ai-services" />
    <id>https://www.1337sheets.com/p/safeguarding-image-data-in-enterprise-ai-services#9094</id>
    <author>
      <name>Shuvro Hawk</name>
    </author>
    <published>2025-03-29T20:23:50Z</published>
    <updated>2025-03-29T20:23:50Z</updated>
    
    <summary>
      <![CDATA[ Leading AI services have integrated powerful image processing capabilities, but the way they handle sensitive visual data varies widely between enterpris...ata. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[AI/ML-Driven Blue Team Operations in 2024–2025: Advancements in Malware Detection]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/ai-ml-driven-blue-team-operations-advancements-in-malware-detection" />
    <id>https://www.1337sheets.com/p/ai-ml-driven-blue-team-operations-advancements-in-malware-detection#9052</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-03-28T20:25:46Z</published>
    <updated>2025-03-28T20:25:46Z</updated>
    
    <summary>
      <![CDATA[ In the cyber battlefield of 2024-2025, Blue Teams wield AI/ML as their digital sword and shield against the ever-growing tsunami of threats. Traditional ...ish. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[HTB Cyber Apocalypse CTF 2025: Tales from Eldoria - Forensics - Silent Trap]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/htb-forensics-silent-trap" />
    <id>https://www.1337sheets.com/p/htb-forensics-silent-trap#8996</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-03-26T15:22:06Z</published>
    <updated>2025-03-26T15:22:06Z</updated>
    
    <summary>
      <![CDATA[ In the virtual realm of Eldoria, a sinister force lurks. Through careful analysis of digital breadcrumbs, we unravel the web of deception, exposing the a...rld. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[HTB Cyber Apocalypse CTF 2025: Tales from Eldoria - AI ML - Enchanted Weights]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/htb-ctf-ai-enchanted-weights" />
    <id>https://www.1337sheets.com/p/htb-ctf-ai-enchanted-weights#8998</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-03-26T14:55:51Z</published>
    <updated>2025-03-26T14:55:51Z</updated>
    
    <summary>
      <![CDATA[ A mystical neural crystal holds ancient secrets. Through Python and PyTorch, we unveil its hidden structure – a simple linear model without bias. The tru...ign. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[HTB Cyber Apocalypse CTF 2025: Tales from Eldoria - AI ML - Malakar's Deception]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/htb-cyber-apocalypse-ctf-tales-from-eldoria-ai-ml-malakars-deception" />
    <id>https://www.1337sheets.com/p/htb-cyber-apocalypse-ctf-tales-from-eldoria-ai-ml-malakars-deception#9005</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-03-26T13:25:59Z</published>
    <updated>2025-03-26T13:25:59Z</updated>
    
    <summary>
      <![CDATA[ In the depths of a magical artifact, encoded secrets lie. The true enchantment reveals itself not in the surface, but in the hidden Lambda layer, where b...ion. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[HTB Cyber Apocalypse CTF 2025: Tales from Eldoria - AI ML - Crystal Corruption]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/htb-ctf-ai-crystal-corruption" />
    <id>https://www.1337sheets.com/p/htb-ctf-ai-crystal-corruption#8999</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-03-26T03:07:14Z</published>
    <updated>2025-03-26T03:07:14Z</updated>
    
    <summary>
      <![CDATA[ A corrupted crystal holds secrets. Decode the hidden enchantments, extract the flag, and dispel the dark magic lurking within the machine learning model. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[HTB Cyber Apocalypse CTF 2025: Tales from Eldoria - AI - EMBASSY]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/ai-embassy" />
    <id>https://www.1337sheets.com/p/ai-embassy#8997</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-03-26T01:46:40Z</published>
    <updated>2025-03-26T01:46:40Z</updated>
    
    <summary>
      <![CDATA[ In the dance of AI and human interaction, sometimes frustration leads to unexpected breakthroughs. A simple reversal of thought can unlock doors previous...hut. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[HTB Cyber Apocalypse CTF 2025: Tales from Eldoria - Cryptography - Traces]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/htb-cyber-apocalypse-ctf-tales-from-eldoria-traces" />
    <id>https://www.1337sheets.com/p/htb-cyber-apocalypse-ctf-tales-from-eldoria-traces#8993</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-03-25T19:42:07Z</published>
    <updated>2025-03-25T19:42:07Z</updated>
    
    <summary>
      <![CDATA[ In the mystical realm of EldoriaNet, a sacred message lies hidden behind flawed encryption. By exploiting the repeated use of a magical key, one can weav...rns. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[Flipper NFC & Sub-GHz Testing: What can it actually hack? Let’s Find Out!]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/flipper-nfc-sub-ghz-testing-what-can-it-actually-hack-lets-find-out" />
    <id>https://www.1337sheets.com/p/flipper-nfc-sub-ghz-testing-what-can-it-actually-hack-lets-find-out#7138</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-02-23T16:05:02Z</published>
    <updated>2025-02-23T16:05:02Z</updated>
    
    <summary>
      <![CDATA[ Tested Flipper Zero's NFC and Sub-GHz capabilities. Successfully read NFC tags but couldn't clone garage remote. Fun gadget, needs finesse for advanced hacking. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[PDF Cracking with John the Ripper: Because Locked PDFs Are Just an Invitation]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/pdf-cracking-with-john-the-ripper-because-locked-pdfs-are-just-an-invitation" />
    <id>https://www.1337sheets.com/p/pdf-cracking-with-john-the-ripper-because-locked-pdfs-are-just-an-invitation#7096</id>
    <author>
      <name>Preston Zen | OSCE³</name>
    </author>
    <published>2025-02-23T15:00:38Z</published>
    <updated>2025-02-23T15:00:38Z</updated>
    
    <summary>
      <![CDATA[ Crack locked PDFs using John the Ripper on Kali Linux. Install Kali, set up John, extract PDF hash, crack password via brute force or wordlist attack, re...ink. ]]>
    </summary>
    
  </entry>
  
  <entry>
    <title><![CDATA[OffSec - BackupBuddy]]></title>
    <link rel="alternate" type="text/html" href="https://www.1337sheets.com/p/offsec-backupbuddy" />
    <id>https://www.1337sheets.com/p/offsec-backupbuddy#6213</id>
    <author>
      <name>Shuvro Hawk</name>
    </author>
    <published>2024-12-29T17:37:02Z</published>
    <updated>2024-12-29T17:37:02Z</updated>
    
    <summary>
      <![CDATA[ This lab focuses on exploiting vulnerabilities in BackupBuddy, starting with an nmap scan revealing an Ubuntu server with default credentials on a PHP fi...les. ]]>
    </summary>
    
  </entry>
  
</feed>
