Technical writeups, security research, and insights from the field
Security research, tool development insights, and CTF writeups
Deep dive into forensic file analysis with machine learning. Exploring polyglot detection, intelligent repair strategies, and how Filo handles 90+ file formats for security professionals.
Read MoreExploring advanced techniques for data exfiltration using ICMP, DNS, and HTTP protocols. A technical overview of the CoCo framework and evasion strategies.
Read MoreComplete walkthrough of Linux privilege escalation techniques, from basic misconfigurations to advanced kernel exploits. Includes practical examples and GTFOBins usage.
Read MoreStep-by-step methodology for web application penetration testing. Covering reconnaissance, vulnerability identification, and exploitation techniques.
Read MoreIntroduction to malware analysis methodologies. Learn how to safely analyze suspicious binaries using both static and dynamic analysis approaches.
Read MoreExploring security vulnerabilities in AI chatbots and large language models. Understanding prompt injection attacks and defense mechanisms.
Read MoreDetailed writeups from various CTF platforms and competitions
Collection of writeups from advanced TryHackMe rooms covering web exploitation, privilege escalation, and active directory attacks.
Read MoreStep-by-step solutions for retired HackTheBox machines. Detailed methodology and tool usage for realistic penetration testing scenarios.
Read MoreSolutions for challenging picoCTF problems focusing on binary exploitation, reverse engineering, and cryptographic challenges.
Read MoreNew articles and CTF writeups are added regularly. Follow me on GitHub and LinkedIn to get notified when new content is published.