> Securinets Friendly 2025 - Pwn Writeups_
Complete writeups for all binary exploitation challenges from the Securinets Friendly 2025 CTF competition.
Co‑founder of AI-assisted exploit platform, CTF player at FL1TZ, and ICT Engineering student. Focused on vulnerability research, binary exploitation, reverse engineering and efficient low‑level systems.
Co-founded and developed AI-assisted exploit platform, achieving 35% reduction in deobfuscation time and 20% faster manual research.
4th place in Brunner CTF 2025 (1,158 teams), qualified for CSAW 2025 finals (top 4 MENA region), ASCW CTF finalist (Top 10), authored 20+ challenges for 400+ participants.
High-performance x86-64 web server built entirely in assembly with optimized memory management and concurrent connection handling.
Deep dives into vulnerability research, CTF writeups, and security analysis.
Complete writeups for all binary exploitation challenges from the Securinets Friendly 2025 CTF competition.
Quick practical primer: netcat essentials, pwntools workflow, format string primitives, calling conventions, and integer overflows.
Discovery and analysis of a critical vulnerability in cJSON that allows attackers to bypass array bounds checking and access restricted data through malformed JSON pointer exploitation.
"Aut viam inveniam aut faciam"
I will either find a way or make one