Published inInfoSec Write-upsHeap exploitation journey #1 — Tcache attackHi guys. It’s been months since I last played CTFs. Now I’m back at it to learn about heap exploitation. I will be making blogs like this…Oct 1, 2021Oct 1, 2021
damCTF 2020 writeup — allokayHi everyone! It’s been a long time. Today I will walk you through the pwn challenge allokay in damCTF 2020.Oct 14, 2020Oct 14, 2020
Published inInfoSec Write-upsDEFCON 2016 Quals writeup — feedmeHi guys and welcome back to another CTF writeup. This time I will show you how I solved the pwn challenge feedme from DEFCON 2016 Quals.Aug 10, 2020Aug 10, 2020
csictf 2020 writeup — secret-societyHello everyone and welcome back to another CTF writeup! This post will be about the secret-society pwn challenge from csictf 2020.Jul 22, 2020Jul 22, 2020
csictf 2020 writeup — RickNMortyWelcome back to another CTF writeup! This post will be about the RickNMorty reverse engineering challenge in csictf 2020.Jul 22, 2020Jul 22, 2020
rgbCTF writeup — Advanced Reversing Mechanics 2Welcome back to another CTF writeup! This is a pwn/rev challenge from rgbCTF 2020. In this challenge we are given an array of bytes and a…Jul 16, 2020Jul 16, 2020
rgbCTF — otpIn this challenge we were given a python script which seems to be the encryption algorithm:Jul 15, 2020Jul 15, 2020
picoCTF2019 reverse_cipherThis is a 300 points reverse engineering challenge from picoCTF2019. We were given a binary and a text file. Open the binary in Ghidra…Jul 1, 2020Jul 1, 2020