PinnedThe Dark Side of AI: Inside PyTorch’s Unpatched VulnerabilitiesExploits for Unpatched Zero-Days in PyTorchDec 8, 2024Dec 8, 2024
PinnedExploiting the Transformers Library for Fun and ProfitCVE-2024-11392, CVE-2024–11393, and CVE-2024–11394Dec 7, 2024Dec 7, 2024
Discovering and Exploiting a Path Traversal Vulnerability in Chromium’s md_browser ToolA Deep Dive into the Path Traversal Flaw in Chromium’s md_browser Tool.Mar 22Mar 22
Building OSX Chrome HarvesterUnderstanding Chrome password security by building an OSX malware that steals passwords stored in Chrome.Jan 14Jan 14
Step-by-Step Guide to Creating a Kali Linux VM in VMware Fusion (2025)Updated Instructions for Setting Up a Kali Virtual Machine on macOSJan 11Jan 11
PicoCTF — Bloat.pySolution to PicoCTF Reverse Engineering Challenge — Bloat.pyDec 11, 2024Dec 11, 2024
PicoCTF — Secret of the PolyglotSolution to PicoCTF Forensics Challenge — Secret of the PolyglotJul 15, 20241Jul 15, 20241
PicoCTF — babygame01Solution for PicoCTF binary exploitation problem — babygame01Jul 13, 2024Jul 13, 2024
PicoCTF — Local TargetSolution to the Binary Exploitation Problem Local TargetJul 11, 20241Jul 11, 20241
Creating a Malware to Escape FlareVMEscaping FlareVM through a poorly configured OwnCloud instanceJun 27, 2024Jun 27, 2024
Code Execution via Untrusted Pickle Deserialization in CatBoostRevealing the risks of pickle deserialization in machine learning libraries like CatBoost.Jun 21, 2024Jun 21, 2024
Code Execution Vulnerability in Behave: A Deep DiveExposing the dangers of YAML deserializationJun 19, 2024Jun 19, 2024