Hi there

I like taking things apart, sometimes I even figure out how they work. This is just a place where I drop notes on vuln research, exploitation, and CTFs.

ROPing our way to RCE

From vulnerability to exploit - this post explores the journey of developing an ARM ROP chain to exploit a buffer overflow in uc-http. ...

February 7, 2025 · 1 min · 29 words · born0monday

A Journey to the House of Tangerine

A couple of weeks ago my friend Sir_X told me about a heap challenge he was working on. Since I still have much to learn in this area, I decided to join him. Like most challenges of this kind, the journey was challenging but ultimately rewarding. ...

January 4, 2025 · 13 min · 2715 words · born0monday

Exploring CVE-2023-2163: My Intro to Kernel Hacking

Ever since I got into security, kernel exploitation has fascinated me. So for my bachelor’s thesis, I finally decided to take a first dive into this deep and complex field - one that always seems to have more layers to uncover. ...

December 30, 2024 · 1 min · 211 words · born0monday

Funtran - Maths to the Rescue

Last weekend I took on snakeCTF 2024 Quals. As I’m still focused on improving my binary skills, I decided to go for a reverse engineering challenge called Funtran. It certainly kept me busy for some hours and reminded me that paying attention in maths every now and then was worth it. :) ...

September 13, 2024 · 7 min · 1424 words · born0monday

Syscalls - Messing with Shellcode and Seccomp Filters

I’ve decided to work on my binary exploitation skills lately so I went after some pwn challenges. Syscalls from this year’s UIUCTF was one of them. I learned a ton from it and figured it might be worth sharing. ...

July 25, 2024 · 13 min · 2680 words · born0monday