Content
Activities





6/10/2025, by RenanScarpin
Reverse Engineering lecture
The use and research of reverse engineering in the security market
Read more
3/14/2025, by GANESH-ICMC
Admission Progress 2025
The Admission Process consists of a series of introductory classes on information security topics with the intention of preparing new members for the group.
Read more
12/20/2024, by RenanScarpin
H2HC 2024
Once again Ganesh is present at the Hackers Conference, the largest security conference in Latin America
Read more
11/13/2024, by RenanScarpin
Internet of Things (IoT) security mini-course
On November 16, a mini-course will be given introducing what the Internet of Things (IoT) is, teaching the most common IoT attacks and how to protect yourself from them.
Read more
10/17/2024, by RenanScarpin
Minicourse: How to feel safer on the internet and avoid falling victim to digital scams
Introductory mini-course on the essentials of computer security so that anyone can protect themselves from scams and malware.
Read moreArticles




8/1/2025, by zeguilherme1
Writeup Age of Aquarius - UIUCTF 2025
This was an OSINT challenge in which we had knowledge of a person's Tumblr account and, based only on that account, we needed to find their state/province and country. You can check the account [here](https://www.tumblr.com/16degreesofscorpio).
Read more
8/1/2025, by zeguilherme1
Writeup Bad Blood - UIUCTF 2025
This is a follow-up OSINT challenge. Mr. Blue Sky is just trying his best to build a following, but he's been trying to hide interactions from a particular troll. Our goal is to investigate and find a flag by exploring Bluesky interactions.
Read more
8/1/2025, by zeguilherme1
Writeup Mr. Blue Sky - UIUCTF 2025
This is an introductory OSINT challenge. We have a Bluesky account and want to find a flag by searching through the person's profile.
Read more
9/30/2019, by gmelodie
DoService
Denial of Service (DoS) attacks are becoming increasingly common on the Internet. Whether due to the ubiquitous aspect that the internet has taken on in recent years, the ease with which attacks of this type can be implemented, or even the difficulty of avoiding them, it is clear that today more than ever denial of service attacks are a growing threat.
Read more