> Securinets Friendly 2025 - Pwn Writeups_
Complete writeups for all binary exploitation challenges from the Securinets Friendly 2025 CTF competition.
Explore all posts covering security research, exploit development techniques, CTF writeups, and industry insights.
Complete writeups for all binary exploitation challenges from the Securinets Friendly 2025 CTF competition.
Quick practical primer: netcat essentials, pwntools workflow, format string primitives, calling conventions, and integer overflows.
Discovery and analysis of a critical vulnerability in cJSON that allows attackers to bypass array bounds checking and access restricted data through malformed JSON pointer exploitation.
Comprehensive writeups for binary exploitation challenges from FL1TZ SummerRush CTF, featuring advanced memory corruption and seccomp bypass techniques.
Comprehensive writeups for all binary exploitation challenges from Red Pointer CTF, featuring advanced exploitation techniques across 8 unique challenges.
Comprehensive writeups for the pwn challenges from TJCTF 2025.
Quick writeups for some of the challenges I solved during the ctf
A comprehensive guide to essential Linux concepts and commands for binary exploitation, including shells, process memory layout, and system calls.
Detailed writeups for the binary exploitation (pwn) challenges from the Securinets FST workshop.