Projects & Write-Ups

CTF write-ups, security research, tools, and real-world case studies.

CTF Write-Up HTB • Hard

HTB — Buffer Overflow Exploitation

Step-by-step walkthrough of a classic stack-based buffer overflow on a 32-bit Linux binary. Covers fuzzing, pattern creation, bad char analysis, and shellcode injection.

Binary Exploitation GDB pwntools
Read Write-Up →
Open Source Tool Python

SubEnum — Subdomain Enumerator

A fast multi-threaded subdomain enumeration tool with DNS bruteforce, certificate transparency log scraping, and Shodan integration.

Python OSINT Recon
View on GitHub →
CTF Write-Up PicoCTF • Medium

SQL Injection to RCE via File Write

Exploiting a blind SQLi vulnerability to write a PHP webshell via MySQL's INTO OUTFILE, escalating to full remote code execution on the target server.

SQLi RCE Web
Read Write-Up →
Research 2024

IoT Attack Surface Analysis

Research into default credentials, exposed admin panels, and insecure firmware update mechanisms across 20 consumer IoT devices. Responsibly disclosed 3 CVEs.

IoT CVE Firmware
View Research →
Open Source Tool Bash

AutoPrivEsc — Linux PrivEsc Checker

Automated Linux privilege escalation checker. Scans for SUID/SGID binaries, writable cron jobs, kernel exploits, and misconfigured sudoers entries.

Bash Linux PrivEsc
View on GitHub →
Research 2023

Phishing Campaign Analysis

Reverse-engineered a credential harvesting phishing campaign targeting financial institutions. Documented infrastructure, evasion techniques, and IOCs.

Threat Intel IOC OSINT
View Report →