Day 4 of the No-AI challenge: analyzing the Obfuscated malware challenge and verifying file hashes.
Day 3 of the No-AI challenge: focusing on initial malware analysis and malicious script deobfuscation.
Day 2 of the No-AI challenge: exploring blue team tactics, DFIR, and network forensics using Wireshark.
Day 1 of my personal challenge: diving into memory corruption and pwn concepts entirely without AI assistance.
Learning binary exploitation through Return Oriented Programming (ROP), focusing on POP RDI gadgets and execution flows.
A beginner-friendly guide to writing and injecting shellcode using Shellcraft for binary exploitation.
Detailed walkthrough and personal notes on solving basic buffer overflow and ret2win challenges.
Security research notes and payload examples for identifying and exploiting Path Traversal (LFI/RFI) vulnerabilities.
Exploring how integer division and modulo operations work at the low level in x86_64 assembly language.
themes