diff --git a/Linux/AKA/Flag.png b/Linux/AKA/Flag.png
new file mode 100644
index 0000000..7c93896
Binary files /dev/null and b/Linux/AKA/Flag.png differ
diff --git a/Linux/AKA/README.md b/Linux/AKA/README.md
new file mode 100644
index 0000000..0e3d421
--- /dev/null
+++ b/Linux/AKA/README.md
@@ -0,0 +1,20 @@
+## AKA
+The main idea finding the flag is using `base64` command.
+
+#### Step-1:
+When we run `nc chall.csivit.com 30611`, we are pwned into a shell. I tried some basic commands like
+`ls` to find flag, but it is blocked.
+
+
+
+
+#### Step-2:
+So I tried `base64 flag.txt | base64 -d`, and luckily worked.
+
+
+
+Voila! We have our flag.
+
+#### Step-2:
+Finally the flag becomes:
+`csictf{1_4m_cl4rk3_k3nt}`
\ No newline at end of file
diff --git a/Linux/AKA/ls.png b/Linux/AKA/ls.png
new file mode 100644
index 0000000..196c0e9
Binary files /dev/null and b/Linux/AKA/ls.png differ
diff --git a/Linux/HTB 0x1/Flag.png b/Linux/HTB 0x1/Flag.png
new file mode 100644
index 0000000..d693efa
Binary files /dev/null and b/Linux/HTB 0x1/Flag.png differ
diff --git a/Linux/HTB 0x1/README.md b/Linux/HTB 0x1/README.md
new file mode 100644
index 0000000..eeaceff
--- /dev/null
+++ b/Linux/HTB 0x1/README.md
@@ -0,0 +1,29 @@
+## HTB 0x1
+The main idea finding the flag is anonymous FTP bypass.
+
+#### Step-1:
+The idea is similar to getting root access of a machine. So I started with basic `nmap 34.93.37.238` scan on the server. But unfortunately, not much.
+
+#### Step-2:
+So I random access on FTP server through the given IP address by `ftp -p 34.93.37.238 5001`.
+
+Voila! I was in!
+
+No idea of credentials though.
+
+#### Step-3:
+So I just tried to access the FTP page through URL: ftp://34.93.37.238:5001/
+
+It directly showed this webpage.
+
+
+
+#### Step-4:
+
+Next it was just navigating through to get the flag.
+
+
+
+#### Step-5:
+Finally the flag becomes:
+`csictf{4n0nym0u5_ftp_l0g1n}`
\ No newline at end of file
diff --git a/Linux/HTB 0x1/Web1.png b/Linux/HTB 0x1/Web1.png
new file mode 100644
index 0000000..b92286f
Binary files /dev/null and b/Linux/HTB 0x1/Web1.png differ
diff --git a/Linux/HTB 0x1/flag.txt b/Linux/HTB 0x1/flag.txt
new file mode 100644
index 0000000..a7556c2
--- /dev/null
+++ b/Linux/HTB 0x1/flag.txt
@@ -0,0 +1 @@
+csictf{4n0nym0u5_ftp_l0g1n}
diff --git a/Linux/Where am I/README.md b/Linux/Where am I/README.md
new file mode 100644
index 0000000..8f5dc9e
--- /dev/null
+++ b/Linux/Where am I/README.md
@@ -0,0 +1,11 @@
+## Where am I
+The main idea finding the flag is anonymous FTP bypass.
+
+#### Step-1:
+I had to follow this because following `id_rsa` is not helping me bypass to root.
+
+https://noob-atbash.github.io/writeups/csictf-20/linux/linux#whereami
+
+#### Step-5:
+Finally the flag becomes:
+`csictf{n1c3_d093_w0w_5uch_55h}`
\ No newline at end of file
diff --git a/Linux/find32/Flag.png b/Linux/find32/Flag.png
new file mode 100644
index 0000000..4831f9d
Binary files /dev/null and b/Linux/find32/Flag.png differ
diff --git a/Linux/find32/README.md b/Linux/find32/README.md
new file mode 100644
index 0000000..35a9384
--- /dev/null
+++ b/Linux/find32/README.md
@@ -0,0 +1,96 @@
+## find32
+The main idea finding the flag is using basic Linux commands.
+
+#### Step-1:
+When we run `ssh user1@chall.csivit.com -p 30630` and password as `find32`, we are pwned into a shell.
+
+A simple `ls` command gives us many files which are random.
+
+```
+02KG7GI3 66SLWGGM AZF6YNNW HI1HXC9E LP29J6MU PM7NRHP0 VCSYBT6V
+02M95EZJ 6IGISUOK BAL0FX4Y HJ7SLXWJ LQWDHMT1 PMWQY71J VFFKFKFP
+041Q5VQ6 6IS45I48 BDMSPZFU HKX85U5A LR9H9RJ4 PN7VNWMY VL8QUY6U
+0K8HTQUI 6JFHFM48 BDYM2DL3 HL9OQ59W LS1E6E8N PRIT98R2 VOAZ2FLA
+0L51GUQ6 6JJ8M6EQ BH13PMF2 HTFON23U M0ODDGTQ PUKTT71A VQHX8Y2S
+0POE7NLS 6KPKMW7F BP1QOD2S HW9ZGUI0 M2D9A9GW PX7XX8MV VS2QLP5T
+0XC8TJL6 6NZ8YTHN BRKQC7KI HWR8ILW8 M2W3FH21 PXR9X9H1 VS5RKUTC
+10KS7XSL 6O893R7P BT4Q0KSC I0GJ1ZT2 M40WA6L0 Q3VV2P04 VU7UXE91
+17HSIYXQ 6TQAQ9JL BUIYBJW6 I0HK3F0Q M45WG887 QBZ2NYYY VUU3IP28
+1DB6A3RZ 6Y96J42D BW90182E I3QH2SGS M4PSP87C QDDZKQBI VWXNPY8W
+1EBY9SNN 71PCO4II BZE1NCWY I7BE5SNQ M50MK22L QDZM9GU3 VYXH92ZI
+1TE2UPR9 74EIPRM5 C1KDRW2G I7BYYSUH M6MO9M1W QON3WELD W569XUGK
+1VQPZIUO 784MLE5E C5L2LOAA IHGA1LHQ M8XE7P73 QV763DK6 W56UYZUK
+1W6RAWEU 79VJFIU5 C75ZYB8Q INUIDPFZ MAC4PGYS QXKDIR8P W7N3EQ8A
+21X763CW 7EA2V52Y C7LAWJCM ISW6FLPB MDZE1NQC QYBFIDQA W8XHJP69
+24CHFLCM 7IKIFVQC C9EN38OZ IUKF08Y4 MIN0CJNB QYKLAVOR WFLCEXOU
+24UQMOA7 7JKVQ1V4 CB7VL2AM IW0M1T97 MITS1KT3 QZBKI0LI WHYUOJS2
+2FFS4207 7K2HS4Y8 CR8AY5W7 IXLBEBRX MLNCZNJH R3O1QJRE WO7DKKIR
+2L9WVOQA 7O0E74NI CVDGAH14 IYLAWPCR MLRX5NHC R513RF7X WQYZVZ02
+2MMNROKS 7QQAKH41 CYNFLG1O IYT9TNZ3 MT0ZF01M R75LDKZA WW5L7JNK
+2X82259Q 7UB67288 D01U0OA5 J634H910 MVYJ08ZU RHZ4QIGE WXW4GEDU
+31H6U39X 7UYWYDBZ DC953402 J9K0N1G3 MWE4SJWL RSA9B4XA X1SVRUTM
+32DJSRCD 80TD6MQ1 DHI6XKWG JBNLA5LS N56AGDMY RXHHGT3D X23268R9
+36VMK9BG 82R7NE45 DQZAE7MY JCUBGZ0L N8O0W1UR RYRXFTD0 X44EBTIV
+3B2F652L 84XR0NUK DVRULQ4L JD8K3921 N9ZX32OP S3CQF12S X4O9C3E9
+3C71HLAH 89JKXHMI E2DCKTAW JDVT05Q1 NDR9IE07 S50ORS2M X70F203P
+3CWSG1VM 8AYM8OQ9 E2WWNK1U JL8V5YGI NGT5TVLI S9796BM8 XA6HG1VW
+3E7ZTAVL 8BHHDOCA E3VMO1UV JM035B27 NJJ4FIMD SA13FEFE XAGJI6C3
+3FSO4YLX 8DCJBGN8 EBGAB2T7 JMXU733Y NMMNMEDT SGCS15D7 XBJ59Z81
+3MPI6ZGG 8O23G30S EDL1IX5Y JNTGVLSL NNGY3F51 SSNMEO7G XESS84R7
+3NI0KD8T 8Q8IDTC7 EJKM4P8J JQJIA3QC NQ3BFZKH ST1FTYFZ XM6M6XV3
+3O7SZPP5 8SQP2JFV EMAPY1SV JSWT0A61 NTIJFZDS STYTHKQE XVXM67UN
+3SF18NHO 90ORMN66 EMOTUDML JW5DHBI2 NWAG08DF SWD8ZKVQ XZ5KZZPR
+3WJNQHOI 931P2T2C EPIGX1NO JYP14B13 NXH2E4FB SXRZ25DU Y0WAA0QK
+3Y6ULSYJ 95NBR36B EUXTE3IX K5HIYP7U O08K936H T0ST0WFT Y2F5YYPT
+40HE4X61 99KWRIDG EXVHNHYF K7H88QI2 O20W8JF2 T5D06H6O Y41T1L0P
+41W0HO2L 9EO10QRH EYN874N3 K80WPMFB O8C1K8CS THW3C7CC YB6CGUEN
+4DXWEUAK 9KHTQSOG F4K726ZE K8670JAD OA9OWQNN TIE17JV7 YGAD81HL
+4E5VZT6C 9KQEWTD4 F5FFWSP3 KDT49C2O OAVKKSIU TNGM39LQ YI5ISTTI
+4FMGJMPX 9KVDBM8O F9T58X71 KJ26BDR0 OB0TZRYT TNNLXAMK YI9VPU71
+4LMTFZCM 9LNZ0ETP FH0FGQU9 KOIIQDDB OHGWT0IT TOD5ZOWV YJ4H3LH9
+4LYTO0ZG 9MP89P4E FI9WZ1NI KQFVQJ3J OI290XGJ TP72DLYC YJPL7KY5
+4NE1DLAV 9QNUXM4L FJATAT6I KRNKFQTK OJTT5YOZ TQYI4JH2 YLTYQ7PT
+4O0KVR5P 9R6FWLZQ FMZXZWMD KRTDDSYK OLHQ2XMI TY2N5W2V YZOFT123
+4UOCNFI8 9SMDHC89 FOGK2TD9 KTE9QN31 OM4BZRJ6 TZ4TM4KC Z8TPG2SQ
+4VTQDZXG 9TM8NR4D FPLW13DY KUNZ9OP2 OO08I86R U1HE6HJU ZE0LYP1J
+526KAB1Q 9UGJX4Z2 FUF4GEJ2 L25P2X6S OPTKWTEN U1Z144SU ZIIFJZRE
+5669QKVZ 9X0BSFFX G18VV3XH L6RJI5MH OTQLM9FR U4CT6S3M ZKOYMDBL
+5714I59N 9YN7B5TM G20VWPOJ L97LN1SA OVB0C2DD U9KXZUZT ZOM1L6RA
+5D8MSKXV A202VRDJ G4DRQMVC L9HIBPO9 OXNCWNKP UFF3VJES ZUIZ3BRS
+5DNAUH8Z A8DWWULS GBIA0FJJ L9NCYUOA P7U25CJI UFRWO7LV ZXWG1CJB
+5DY1KZDZ A9ARPBTE GCCH7GUL LA28D194 P7ZSATBS UI3CYXEH ZYSF9F0A
+5E0OD9MJ AK1L1RB0 GGK14ZEP LB4B6X6P P8H2QJZE UK268DBR
+5FOOLY10 AK6PZX3H GN72VYNY LDMDGEL4 PBMIEOJ1 UMVACDSG
+5HQTP051 AL2HOE1I GVAUVIPU LF6NHZRK PF2KOY3A UOKCOUPN
+5OWRFEZT ATP6Z1LV GVTHMJMC LIVI4VP2 PJU5YNCE USP8NX9I
+5S7QF3H6 AYHI7FZG H782K0GF LKLQLQ8B PKEIXGTL UTNI6PSD
+5ZCQW7TK AZBQ6DI4 H7PWE6D1 LKUM0ZLZ PLE8FFL4 V8A4PPEG
+```
+
+#### Step-2:
+So I tried `grep -R {`, to search for possible flags throughout.
+
+
+
+#### Step-3:
+Well, I was greeted with a false flag & new user credentials, so I ssh'ed with that next time.
+
+`ssh user2@chall.csivit.com -p 30630` and password as `AAE976A5232713355D58584CFE5A5`. This weird ass number beside User2 name.
+
+Luckily I was in.
+
+#### Step-4:
+
+This time I tried `ls` and actually find very less files.
+
+
+
+#### Step-5:
+
+So I immediately tried `grep -R _` and got it.
+
+
+
+#### Step-3:
+Finally the flag becomes:
+`csictf{th15_15_unu5u41}`
\ No newline at end of file
diff --git a/Linux/find32/grep1.png b/Linux/find32/grep1.png
new file mode 100644
index 0000000..ed21052
Binary files /dev/null and b/Linux/find32/grep1.png differ
diff --git a/Linux/find32/ls.png b/Linux/find32/ls.png
new file mode 100644
index 0000000..0f91fcc
Binary files /dev/null and b/Linux/find32/ls.png differ