<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>TomatoBuster — CTF Writeups</title>
    <link>https://tomatobuster.github.io/WriteUps/</link>
    <description>In-depth CTF writeups covering web, pwn, crypto, reversing and more.</description>
    <language>en-us</language>
    <atom:link href="https://tomatobuster.github.io/WriteUps/feed.xml" rel="self" type="application/rss+xml"/>

    <item>
      <title>DevArea — HTB Writeup</title>
      <link>https://tomatobuster.github.io/WriteUps/writeups/devarea.html</link>
      <description>Chaining XOP and Aoache CXF exploitation with HoverFly RCE and Bash binary overwriting to gain full system access. HackTheBox 2026, Web, Medium.</description>
      <pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate>
      <guid>https://tomatobuster.github.io/WriteUps/writeups/devarea.html</guid>
    </item>

    <item>
      <title>Kobold — HTB Writeup</title>
      <link>https://tomatobuster.github.io/WriteUps/writeups/kobold.html</link>
      <description>Exploiting an unauthenticated API and abusing a Docker socket to achieve container escape. HackTheBox 2026, MISC, Easy.</description>
      <pubDate>Mon, 24 Mar 2026 00:00:00 GMT</pubDate>
      <guid>https://tomatobuster.github.io/WriteUps/writeups/kobold.html</guid>
    </item>
    <item>
      <title>Silentium — HTB Writeup</title>
      <link>https://tomatobuster.github.io/WriteUps/writeups/silentium.html</link>
      <description>Flowise AI api exploitation, Docker Escape and Gogs CVE. HackTheBox 2026, MISC, Easy.</description>
      <pubDate>Mon, 24 Mar 2026 00:00:00 GMT</pubDate>
      <guid>https://tomatobuster.github.io/WriteUps/writeups/silentium.html</guid>
    </item>

  </channel>
</rss>  