Offensive Security & Bug Bounty Research

I share writeups, tools, and insights into real-world pentesting.

β€œDon't listen to the person who has all the answers. Listen to the person who has the questions.”
β€” Albert Einstein

Latest Articles

πŸ” DSA Exploitation – Digital Safety Annex

How predictable nonce generation in DSA led to full key recovery and flag access in a cryptographic CTF challenge.

Read more β†’

🧠 Desires – Session Hijack via Zip Slip

Combining CVE-2024-0406 with session prediction and flawed auth logic to gain admin access.

Read more β†’

🐍 HTB Code – Python Sandbox Escape

From blacklist bypass to path traversal via jq, this write-up shows a full box compromise using Python introspection.

Read more β†’