CTF Cryptography Cheatsheet/Checklist
CTF Cryptography Cheatsheet - A practical cheatsheet, checklist, and guide for Cryptography CTF challenges.
Specialized in Cyber Security, Software Testing and Developement I'm Neeraj Singh Panghal, currently working as a Cybersecurity Engineer . I have hands-on experience with security assessments, CTFs, HackTheBox, and TryHackMe challenges. Passionate about implementing robust security solutions.
Some of the technologies I've worked with:
A brief overview of my professional journey in cybersecurity and software testing
Contributed to the development of xIoTz eXtended Operation Centre (XOC), a unified cyber assurance platform integrating NOC, SOC, TOC, CSPM, and NGVA. Worked on automated threat Detection & responses and integrated Wazuh for security monitoring.
Automated web/API testing using Java, Selenium, and Postman. Improved CI/CD with GitHub Actions. Used JIRA, Trello, and Allure for reporting and defect tracking.
Worked on real-world cases in bug hunting, digital forensics, OSINT, and cyber law. Performed penetration testing with tools like Nmap, BurpSuite, and Metasploit.
My professional accomplishments and credentials
Check out some of my latest work in cybersecurity and software development
A tool to monitor server activity and performance in real-time.
A Python-based tool designed to simplify QA testing with secure multi-user login, easy installation, and organized test checklists.
A tool for extracting and dumping raw data from various sources quickly and efficiently.
Online tools to encode and decode various ciphers. Perfect for CTF challenges, cryptography puzzles, and learning about different encryption methods.
Encode and decode messages using the Bill Cipher, a substitution cipher from the show Gravity Falls.
Encode and decode messages using the Birds on a Wire Cipher, a substitution cipher where letters are...
Encode and decode messages using the Daggers Alphabet cipher, a substitution cipher that uses dagger...
Encode and decode messages using the Dancing Men Cipher, a substitution cipher from the Sherlock Hol...
Encode and decode messages using the Gravity Falls Rune Cipher, a mystical substitution cipher from ...
Encode and decode messages using the Hexahue Alphabet Cipher, a substitution cipher where letters ar...
CTF Cryptography Cheatsheet - A practical cheatsheet, checklist, and guide for Cryptography CTF challenges.
Linux Commands for Hackers: Your Essential Cheat Sheet. Perfect for cybersecurity beginners, CTF players, and ethical hackers. Master the terminal today!
A complete Steganography 101 CTF Cheatsheet covering essential tools, techniques, and tips to solve image, audio, and file-based stego challenges. Perfect for beginners and CTF players looking to master hidden data analysis.
A practical cheatsheet, checklist, and guide for CTF (Capture The Flag) competitions, covering essential techniques, tools, and tips for all major challenge categories.
I'm always open to discussing cybersecurity projects and opportunities.
Let's connect and make the digital world more secure!