Securinets Friendly 2025 - Pwn Writeups
This post contains quick writeups for all the binary exploitation (pwn) challenges from the Securinets Friendly 2025 CTF competition. The challenges a...
View Post →
Security Researcher & Exploit Developer
This post contains quick writeups for all the binary exploitation (pwn) challenges from the Securinets Friendly 2025 CTF competition. The challenges a...
View Post →Short, focused tips for absolute beginners: connect with netcat, automate with pwntools, abuse format strings, understand basic calling conventions (x...
View Post →A critical vulnerability exists in the cJSON library (`cJSON_Utils.c`, function `decode_array_index_from_pointer`) that allows attackers to bypass arr...
View Post →Complete writeups for the binary exploitation challenges from FL1TZ SummerRush CTF. This CTF featured two pwn challenges that showcased the following ...
View Post →Complete writeups for all the challenges from Red Pointer CTF, which I organized alongside Taz (Moetez Zouari). The CTF featured 8 unique pwn challeng...
View Post →These are quick writeups for the pwn challenges from TJCTF 2025. Unfortunately, I wasn't able to participate during the CTF, but since the platform re...
View Post →This post contains quick writeups for some of the challenges I solved during the Cybertek CTF.
View Post →Last week, I hosted a binary exploitation workshop at the Faculty of Sciences of Tunis, put together in collaboration between FL1TZ and Securinets FST...
View Post →> This post is still a WIP
View Post →