Blog

Return

Explore all posts covering security research, exploit development techniques, CTF writeups, and industry insights.

Posts

AuthorWriteup

Red Pointer CTF - Complete PWN Writeups

Comprehensive writeups for all binary exploitation challenges from Red Pointer CTF, featuring advanced exploitation techniques across 8 unique challenges.

Jun 16, 2025
Read more
Writeup

TJCTF 2025 - PWN Writeups

Comprehensive writeups for the pwn challenges from TJCTF 2025.

Jun 9, 2025
Read more
Ranked 4thWriteup

Cybertek CTF 2025 - Writeups

Quick writeups for some of the challenges I solved during the ctf

May 4, 2025
Read more
Author

PWN 101

A comprehensive guide to essential Linux concepts and commands for binary exploitation, including shells, process memory layout, and system calls.

Apr 15, 2025
Read more
AuthorWriteup

Securinets FST CTF-101

Detailed writeups for the binary exploitation (pwn) challenges from the Securinets FST workshop.

Apr 15, 2025
Read more