Published onApril 11, 2026V8 Exploitation: From Libc Pwn to Browser BugsPWNV8Browser-ExploitationCTFA practical guide to getting into V8 and browser exploitation, coming from classic libc-based pwn. Covering the mental model, debug environment, core primitives, and what surprised me along the way.
Published onMarch 9, 2026Setting Up a Debug Environment for QEMU PCI Device ExploitationCTFHTBPWNQEMUPCIKernel