Securinets Darkest Hour 2026 - Pwn Writeups
I will only post writeups for blooded challenges. I will release the others once someone bloods them.
View Post →
I will only post writeups for blooded challenges. I will release the others once someone bloods them.
View Post →This post contains quick writeups for all the binary exploitation (pwn) challenges from the Securinets Friendly 2025 CTF competition. The challenges a...
View Post →Short, focused tips for absolute beginners: connect with netcat, automate with pwntools, abuse format strings, understand basic calling conventions (x...
View Post →A critical vulnerability exists in the cJSON library (cJSONUtils.c, function decodearrayindexfrom_pointer) that allows attackers to bypass array bound...
View Post →Complete writeups for the binary exploitation challenges from FL1TZ SummerRush CTF. This CTF featured two pwn challenges that showcased the following ...
View Post →Complete writeups for all the challenges from Red Pointer CTF, which I organized alongside Taz (Moetez Zouari). The CTF featured 8 unique pwn challeng...
View Post →These are quick writeups for the pwn challenges from TJCTF 2025. Unfortunately, I wasn't able to participate during the CTF, but since the platform re...
View Post →This post contains quick writeups for some of the challenges I solved during the Cybertek CTF.
View Post →Last week, I hosted a binary exploitation workshop at the Faculty of Sciences of Tunis, put together in collaboration between FL1TZ and Securinets FST...
View Post →This post is still a WIP
View Post →