Software engineer exploring vulnerability research through hands-on binary exploitation and CTF challenges
Kernel syscall table manipulation and privilege escalation
C++ use-after-free exploit with vtable hijacking
ROP chain and buffer overflow exploitation
Buffer overflow with ASCII-only payload constraints
Heap exploitation via unlink attack technique
90-byte binary with heap spraying and ASLR bypass
Writing shellcode under seccomp sandbox restrictions
Buffer overflow with stack canary enabled
ARM assembly reverse engineering with PC register calculations
File descriptor manipulation and Linux I/O fundamentals