LOADING...

System Initializing...
Crash Bandicoot Running
LOADING... 0%
INITIALIZING SYSTEM...

Blog

Return

Explore all posts covering security research, exploit development techniques, CTF writeups, and industry insights.

Posts

AUTHOR

> Pwn Beginner Tips & Tricks_

Quick practical primer: netcat essentials, pwntools workflow, format string primitives, calling conventions, and integer overflows.

Sep 8, 202511 min
SECURITY RESEARCH
CVE-2025-57052

> cJSON Array Index Parsing Vulnerability_

Discovery and analysis of a critical vulnerability in cJSON that allows attackers to bypass array bounds checking and access restricted data through malformed JSON pointer exploitation.

Jul 23, 20253 min
AUTHOR
WRITEUP

> FL1TZ SummerRush CTF - PWN Writeups_

Comprehensive writeups for binary exploitation challenges from FL1TZ SummerRush CTF, featuring advanced memory corruption and seccomp bypass techniques.

Jul 17, 20257 min
AUTHOR
WRITEUP

> Red Pointer CTF - Complete PWN Writeups_

Comprehensive writeups for all binary exploitation challenges from Red Pointer CTF, featuring advanced exploitation techniques across 8 unique challenges.

Jun 16, 202523 min
AUTHOR

> PWN 101_

A comprehensive guide to essential Linux concepts and commands for binary exploitation, including shells, process memory layout, and system calls.

Apr 15, 202520 min
AUTHOR
WRITEUP

> Securinets FST CTF-101_

Detailed writeups for the binary exploitation (pwn) challenges from the Securinets FST workshop.

Apr 15, 202530 min