Securinets Friendly 2025 - Pwn Writeups
This post contains quick writeups for all the binary exploitation (pwn) challenges from the Securinets Friendly 2025 CTF competition. The challenges a...
View Post →
Security Researcher & Exploit Developer
Currently diving deep into exploit development, reverse engineering, and breaking code (whether it's yours, mine, or ours).
Used to do game (and game-engine) dev, and low-level graphics. Admired the creative side, so I still sneak shaders where they have no business being.
Big fan of animals and trees; ducks are the absolute pinnacle of perfection.
My cat helps me debug, paws down, the best co-pilot.
This post contains quick writeups for all the binary exploitation (pwn) challenges from the Securinets Friendly 2025 CTF competition. The challenges a...
View Post →Short, focused tips for absolute beginners: connect with netcat, automate with pwntools, abuse format strings, understand basic calling conventions (x...
View Post →A critical vulnerability exists in the cJSON library (`cJSON_Utils.c`, function `decode_array_index_from_pointer`) that allows attackers to bypass arr...
View Post →