Offensive Security & Bug Bounty Research
I share writeups, tools, and insights into real-world pentesting.
βDon't listen to the person who has all the answers. Listen to the person who has the questions.β
β Albert Einstein
Latest Articles
π DSA Exploitation β Digital Safety Annex
How predictable nonce generation in DSA led to full key recovery and flag access in a cryptographic CTF challenge.
Read more βπ§ Desires β Session Hijack via Zip Slip
Combining CVE-2024-0406 with session prediction and flawed auth logic to gain admin access.
Read more βπ HTB Code β Python Sandbox Escape
From blacklist bypass to path traversal via jq, this write-up shows a full box compromise using Python introspection.
Read more β