0x01. Identity Payload
0x02. Tech Stack & Directives
[Core Infrastructure] Solid foundation in Networking protocols, alongside deep understanding of both Windows and Linux operating systems architecture
[Current Target] Actively researching Binary Exploitation (Pwnable). Mastering memory corruption vulnerabilities starting from Buffer Overflows (BOF), Return-Oriented Programming (ROP), and modern exploit mitigations
[Directive] Transitioning from user-space exploitation towards Linux Kernel exploits and Windows system exploitation
0x03. Portfolio & Roadmap
CTF Write-ups Archive
My personal repository documenting detailed methodologies, exploit scripts, and write-ups for various CTF Pwnable challenges. Focuses on breaking down vulnerabilities from root cause to full exploit
View RepositoryLinux Kernel UAF Exploit
Researching and reproducing Use-After-Free exploitation techniques within Linux Kernel Modules. Goal: Achieve Local Privilege Escalation (LPE) via credential structure overwriting
[ LOCKED ]Windows Exploitation
Diving into the Windows ecosystem to research memory corruption vulnerabilities. Planning to explore Windows Internals, SEH overwrites, and bypass techniques for modern OS mitigations
[ PENDING ]