Research & Write-ups
A collection of cybersecurity write-ups, CTF solutions, and technical deep-dives.
A multi-phase CTF challenge involving reconnaissance, custom hash cracking, credential extraction, and OTP brute-forcing to capture all 3 flags.
A comprehensive exploitation chain from SSRF vulnerability discovery through DNS poisoning, phishing, AI prompt injection, and internal network pivoting to capture all 4 flags.
A massive multi-stage network penetration write-up covering AI prompt injection, SSH pivoting, Active Directory exploitation, Kerberoasting, and domain controller compromise across 6+ machines.
An insane-difficulty two-part binary exploitation challenge involving XOR-encrypted ELF analysis, hidden HTTP paths, Use-After-Free, Tcache poisoning, and House of Apple 2 FSOP RCE.
A comprehensive research framework for user-space anti-debug and anti-instrumentation detection on x86_64 Linux systems.