


Rooting a Machine, CUPS Exploit Chain (4 CVEs 2024)
CVE-Evil Cups I actually did this last year during a sharing session, and I just found it again while organizing my files. Thought I’d give it another try to see if I still remember it. So here I ...

GlacierCTF Writeup
Rev - Wisdom Initial Analysis We are given a 64-bit ELF binary that prompts the user for “wisdom” and validates the input. The binary is dynamically linked and unstripped, making revers...

My Personal Flix with Jellyfin
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi u...

Building My First Malware: Nobu.exe
So I made a keylogger After spending days looking at terrible EXE files made by script kiddies, I figured, “I can make one too—just less trash.” And now it exists: a Windows keylogger that hides i...