PinnedDiscovering and Exploiting a Path Traversal Vulnerability in Chromium’s md_browser ToolA Deep Dive into the Path Traversal Flaw in Chromium’s md_browser Tool.Mar 22Mar 22
PinnedThe Dark Side of AI: Inside PyTorch’s Unpatched VulnerabilitiesExploits for Unpatched Zero-Days in PyTorchDec 8, 2024Dec 8, 2024
PinnedExploiting the Transformers Library for Fun and ProfitCVE-2024-11392, CVE-2024–11393, and CVE-2024–11394Dec 7, 2024Dec 7, 2024
PicoCTF — Flag HuntersSolution to PicoCTF 2025 Reverse Engineering Challenge — Flag Hunters.Apr 2Apr 2
Building OSX Chrome HarvesterUnderstanding Chrome password security by building an OSX malware that steals passwords stored in Chrome.Jan 14Jan 14
Step-by-Step Guide to Creating a Kali Linux VM in VMware Fusion (2025)Updated Instructions for Setting Up a Kali Virtual Machine on macOSJan 11Jan 11
Hack The Box — Low LogicSolution to Hack The Box Hardware ChallengeDec 28, 2024A response icon1Dec 28, 2024A response icon1
PicoCTF — Bloat.pySolution to PicoCTF Reverse Engineering Challenge — Bloat.pyDec 11, 2024Dec 11, 2024