-
From Exploit to False Positive - Leveraging AI for Vulnerability Research
This post focuses on using AI for reviewing code and analysing it for potential security vulnerabilities
-
Analyzing CVE-2025-54366 - RCE via Deserialization of untrusted data
Reproducing insecure deserialization exploit for freescout CVE and reviwing the vulnerable code and fixes for it.
-
Solving SaaS from ImaginaryCTF 2021
CTF challenge based on sed linux utility.
-
Solving Apollo 1337 from San Diego CTF 2021
CTF challenge all based on enumeration and troubleshooting.
-
Solving autograder from WPICTF CTF 2020
Challenge involving application allowing C code compilation which could be exploited to read files.