Behind the Archive

About

person

Hii I am Vector. Waiting for AGI... Exploring cybersecurity, automation, and open‑source learning not to arrive but to continue...

shield

Offensive Security

Penetration testing, red teaming, vulnerability assessment, and exploit development. Experienced in CTF competitions and real-world security assessments.

memory

Binary Exploitation

Reverse engineering, heap exploitation, ROP chains, FSOP, and modern mitigation bypass techniques. Deep knowledge of ELF internals and glibc.

lan

Network Security

Network pivoting, Active Directory attacks, SSRF exploitation, DNS poisoning, and multi-stage network penetration across complex environments.

code

Development

Python, Rust, C/C++, Assembly. Building custom exploit tools, reverse engineering frameworks, and security automation scripts.

“The best way to understand a system's security is to think like the adversary. Every vulnerability tells a story — my white-papers are those stories, documented.”
4+
Write-ups Published
15+
Flags Captured
CTF
Competitions