Behind the Archive
About
person
Hii I am Vector. Waiting for AGI... Exploring cybersecurity, automation, and open‑source learning not to arrive but to continue...
shield
Offensive Security
Penetration testing, red teaming, vulnerability assessment, and exploit development. Experienced in CTF competitions and real-world security assessments.
memory
Binary Exploitation
Reverse engineering, heap exploitation, ROP chains, FSOP, and modern mitigation bypass techniques. Deep knowledge of ELF internals and glibc.
lan
Network Security
Network pivoting, Active Directory attacks, SSRF exploitation, DNS poisoning, and multi-stage network penetration across complex environments.
code
Development
Python, Rust, C/C++, Assembly. Building custom exploit tools, reverse engineering frameworks, and security automation scripts.
“The best way to understand a system's security is to think like the adversary. Every vulnerability tells a story — my white-papers are those stories, documented.”
4+
Write-ups Published
15+
Flags Captured
CTF
Competitions