Welcome to my personal blog and portfolio, where I document my journey through offensive security, vulnerability research, and technical exploration. This site includes writeups, research, projects, and tools focused on real-world exploitation and adversarial techniques.
I'm an aspiring offensive security researcher passionate about breaking systems to understand how they work. My main interests include:
- Binary & kernel exploitation
- Reverse engineering
- Red teaming & post-exploitation
- Fuzzing & exploit development
- CTFs (Capture The Flag)
This site is my knowledge base, a space to learn in public, and showcase the work I’m most proud of.
The blog is organized into the following major sections:
- Binary Exploitation (userland, heap, stack)
- Kernel Exploitation (Linux, Windows)
- Fuzzing & Triage
- CVE Analysis & Reproduction
- Mitigation Bypass Techniques
- Initial Access Techniques
- Privilege Escalation
- Lateral Movement
- Defense Evasion (AV/EDR bypass, OPSEC)
- Command and Control (C2) Tooling
- Payload Development & Obfuscation
- Binary Exploitation
- Kernel Exploitation
- Fuzzing & Crash Analysis
- Exploit Chains
- Mitigation Bypasses
- Pwn
- Rev
- Custom payloads, PoCs, and automation scripts
You'll also find a portfolio section showcasing personal projects:
- Custom exploit toolkits
- CTF tooling
- Red team utilities
- Research writeups