
I maintain a dedicated repository of writeups for the CTF challenges I’ve solved. This serves as both a personal knowledge base and a community resource for up-and-coming security researchers.
Categories Covered#
- Binary Exploitation (Pwn): Buffer overflows, ROP chains, Heap exploitation.
- Reverse Engineering: Disassembling ELF/PE binaries to understand proprietary logic.
- Web Security: SQL Injection, XSS, SSRF, and deserialization attacks.
- Cryptography: Breaking weak encryption schemes and implementation flaws.


