Skip to main content
  1. Portfolios/

Knowledge Base: CTF Writeups

Table of Contents

I maintain a dedicated repository of writeups for the CTF challenges I’ve solved. This serves as both a personal knowledge base and a community resource for up-and-coming security researchers.

Categories Covered
#

  • Binary Exploitation (Pwn): Buffer overflows, ROP chains, Heap exploitation.
  • Reverse Engineering: Disassembling ELF/PE binaries to understand proprietary logic.
  • Web Security: SQL Injection, XSS, SSRF, and deserialization attacks.
  • Cryptography: Breaking weak encryption schemes and implementation flaws.

Visit ctf.samsongama.com

Related