"I explore systems, discover vulnerabilities, and solve Capture-the-Flag challenges through research, reverse engineering, and offensive security techniques."
My journey into cybersecurity began with a curiosity about how systems work—and more importantly, how they can be broken. This fascination evolved into a dedicated pursuit of knowledge in ethical hacking, vulnerability research, and competitive security challenges.
As a CTF player with team root_ninja, I've tackled challenges across multiple domains—from web exploitation to cryptography, reverse engineering to digital forensics. Each challenge is a puzzle waiting to be solved, a system waiting to be understood.
I believe in responsible disclosure and the ethical application of security knowledge. My goal is to strengthen digital infrastructure by identifying vulnerabilities before malicious actors can exploit them.
Team root_ninja secured 3rd position among 500+ teams
International CTF with 2000+ participants
First place in web exploitation category
Exploiting a blind SQL injection to achieve remote code execution on the server.
Analyzing and breaking a flawed RSA implementation with weak prime generation.
Defeating multiple anti-debugging techniques to extract the hidden flag.
Classic stack-based buffer overflow exploitation with shellcode injection.
Extracting hidden malware from a memory dump using Volatility framework.
Exploiting JWT algorithm confusion to forge admin tokens.
Automated vulnerability scanner with plugin architecture for custom checks.
Interactive shellcode generator and encoder for various architectures.
Collection of cryptographic attack implementations for CTF challenges.
OSINT automation tool for gathering reconnaissance data on targets.
Open for collaboration, security research discussions, and CTF team opportunities.