root@system:~$ whoami

chillfish

> SECURITY RESEARCHER // PWNABLE JUNIOR

0x01. Identity Payload

Operator
Nguyễn Đức Duy Hưng
Handle
chillfish
Status
FPT University // Year 1
Field
Information Assurance
Focus
Binary Exploitation / Networking

0x02. Tech Stack & Directives

[Core Infrastructure] Solid foundation in Networking protocols, alongside deep understanding of both Windows and Linux operating systems architecture


[Current Target] Actively researching Binary Exploitation (Pwnable). Mastering memory corruption vulnerabilities starting from Buffer Overflows (BOF), Return-Oriented Programming (ROP), and modern exploit mitigations


[Directive] Transitioning from user-space exploitation towards Linux Kernel exploits and Windows system exploitation

0x03. Portfolio & Roadmap

Active // Repo

CTF Write-ups Archive

My personal repository documenting detailed methodologies, exploit scripts, and write-ups for various CTF Pwnable challenges. Focuses on breaking down vulnerabilities from root cause to full exploit

View Repository
Planned // Future

Linux Kernel UAF Exploit

Researching and reproducing Use-After-Free exploitation techniques within Linux Kernel Modules. Goal: Achieve Local Privilege Escalation (LPE) via credential structure overwriting

[ LOCKED ]
Roadmap // Future

Windows Exploitation

Diving into the Windows ecosystem to research memory corruption vulnerabilities. Planning to explore Windows Internals, SEH overwrites, and bypass techniques for modern OS mitigations

[ PENDING ]
root@system:~$ dive --deep --target=0xDEADBEEF
[*] Analyzing target environment...
[+] Exploit mindset initialized successfully.
© 2026 // Chillfish // Built for Efficiency.