Security Insights

Blog & Research

Technical writeups, security research, and insights from the field

Recent Articles

Security research, tool development insights, and CTF writeups

📝
Coming Soon 7 min read

Building Filo: ML-Powered File Forensics for CTFs

Deep dive into forensic file analysis with machine learning. Exploring polyglot detection, intelligent repair strategies, and how Filo handles 90+ file formats for security professionals.

Read More
🔐
Coming Soon 8 min read

Covert Channels: Beyond Traditional Data Exfiltration

Exploring advanced techniques for data exfiltration using ICMP, DNS, and HTTP protocols. A technical overview of the CoCo framework and evasion strategies.

Read More
🎯
Coming Soon 10 min read

Linux Privilege Escalation: A Comprehensive Guide

Complete walkthrough of Linux privilege escalation techniques, from basic misconfigurations to advanced kernel exploits. Includes practical examples and GTFOBins usage.

Read More
🌐
Coming Soon 6 min read

Web Application Exploitation: From Recon to RCE

Step-by-step methodology for web application penetration testing. Covering reconnaissance, vulnerability identification, and exploitation techniques.

Read More
🦠
Coming Soon 12 min read

Malware Analysis: Static and Dynamic Techniques

Introduction to malware analysis methodologies. Learn how to safely analyze suspicious binaries using both static and dynamic analysis approaches.

Read More
🤖
Coming Soon 7 min read

AI Security: Prompt Injection and Jailbreaking Techniques

Exploring security vulnerabilities in AI chatbots and large language models. Understanding prompt injection attacks and defense mechanisms.

Read More

Capture The Flag Solutions

Detailed writeups from various CTF platforms and competitions

🚩
TryHackMe Coming Soon

TryHackMe: Advanced Exploitation Challenges

Collection of writeups from advanced TryHackMe rooms covering web exploitation, privilege escalation, and active directory attacks.

Read More
⚔️
HackTheBox Coming Soon

HackTheBox: Machine Walkthroughs

Step-by-step solutions for retired HackTheBox machines. Detailed methodology and tool usage for realistic penetration testing scenarios.

Read More
🏆
picoCTF Coming Soon

picoCTF: Binary Exploitation & Cryptography

Solutions for challenging picoCTF problems focusing on binary exploitation, reverse engineering, and cryptographic challenges.

Read More

Want to Stay Updated?

New articles and CTF writeups are added regularly. Follow me on GitHub and LinkedIn to get notified when new content is published.