Pwn Challenges writeup — RVCExIITB CTFHello PWNers, This is a walkthrough article for the binary exploitation/PWN challenges from RVCExIITB CTF competition.Jun 15Jun 15
I found 2 Zero-Days in popular Linux distros that includes Mint, Kali, ParrotThis is the story on how I found 2 Zero-Day Vulnerabilities (4 CVEs). The flaws affected a list popular Linux Desktop distros that…Jan 17Jan 17
Decode-E-Cyber CTF 2023 — PWN/Binary Exploitation Writeup — 1I participated in Decode-E-Cyber CTF 2023 conducted by OWASP VIT Bhopal and we were the Winners! Team Pegasus with 1350 points. We were…Nov 6, 2023Nov 6, 2023
Decode-E-Cyber CTF 2023 — PWN/Binary Exploitation Writeup — 1I participated in Decode-E-Cyber CTF 2023 conducted by OWASP VIT Bhopal and we were the Winners! Team Pegasus with 1350 points. We were…Nov 6, 2023Nov 6, 2023
Malware Analysis Challenges from Huntress CTF 2023 — Part 1 — ChainSaw MassacreHuntress CTF is just over, it was a fun ride for 30 days. This blog is a collection of writeups of the Malware Challenges that I solved in…Nov 2, 20231Nov 2, 20231
CVE-2023–39612: CSP bypasss + XSS to achieve Admin Account Takeover + Remote Command Execution in…My 5th CVE: CVE-2023–39612Sep 22, 2023Sep 22, 2023
Post-Exploitation with HackBrowserData.Steal saved passwords, cookies, bookmarks, and history from the victim’s browser.Mar 28, 20221Mar 28, 20221
CVE-2021–40662 Chamilo LMS 1.11.14 RCEThis is Febin, a Security Researcher. This article is about my third CVE that I got for finding a Remote Code Execution in a popular…Mar 22, 2022Mar 22, 2022
Published inSystem WeaknessCVE-2021–46398 Critical CSRF to RCE in FileBrowserIntroductionJan 28, 20221Jan 28, 20221