Published onApril 11, 2026V8 Exploitation: From Libc Pwn to Browser BugsPWNV8Browser-ExploitationCTFA practical guide to getting into V8 and browser exploitation, coming from classic libc-based pwn. Covering the mental model, debug environment, core primitives, and what surprised me along the way.Read more →
Published onMarch 9, 2026Setting Up a Debug Environment for QEMU PCI Device ExploitationCTFHTBPWNQEMUPCIKernelRead more →
Published onMarch 1, 2026Snyk CTF 2026 - PWN Slab Manager (FSOP)CTFSnyk2026PWNHeap-ExploitationFSOPRead more →
Published onNovember 23, 2025Cyhub CTF 2025 - Hidden GemsCTFCyhub2025Reverse-EngineeringRustRead more →