Library

PublicationsAbout

Research & Write-ups

Publications

A collection of cybersecurity write-ups, CTF solutions, and technical deep-dives.

B
Network SecurityMedium

BreachBlocker Unlocker

A multi-phase CTF challenge involving reconnaissance, custom hash cracking, credential extraction, and OTP brute-forcing to capture all 3 flags.

Flask ExploitationOTP Brute ForceCrypto
Dec 202515 min read
C
SSRF & AI ExploitationHard

Carrotbane of My Existence

A comprehensive exploitation chain from SSRF vulnerability discovery through DNS poisoning, phishing, AI prompt injection, and internal network pivoting to capture all 4 flags.

SSRFDNS PoisoningPrompt Injection
Dec 202525 min read
H
Network PivotingInsane

Hopper's Origin

A massive multi-stage network penetration write-up covering AI prompt injection, SSH pivoting, Active Directory exploitation, Kerberoasting, and domain controller compromise across 6+ machines.

Privilege EscalationActive DirectoryPivoting
Jan 202640 min read
S
Binary ExploitationInsane

Scheme Catcher

An insane-difficulty two-part binary exploitation challenge involving XOR-encrypted ELF analysis, hidden HTTP paths, Use-After-Free, Tcache poisoning, and House of Apple 2 FSOP RCE.

Reverse EngineeringHeap ExploitationFSOP
Dec 202530 min read
U
Research Paper

User-Space Anti-Debug Framework

A comprehensive research framework for user-space anti-debug and anti-instrumentation detection on x86_64 Linux systems.

Anti-debuggingReverse EngineeringTiming Analysis
Feb 202615 min read
favorite

Thank You for Visiting

Thank you for exploring my research and write-ups. Knowledge grows when shared — keep learning.

© 2026 Library. All rights reserved.