PinnedThe Dark Side of AI: Inside PyTorch’s Unpatched VulnerabilitiesExploits for Unpatched Zero-Days in PyTorchDec 8, 2024Dec 8, 2024
PinnedExploiting the Transformers Library for Fun and ProfitCVE-2024-11392, CVE-2024–11393, and CVE-2024–11394Dec 7, 2024Dec 7, 2024
Discovering and Exploiting a Path Traversal Vulnerability in Chromium’s md_browser ToolA Deep Dive into the Path Traversal Flaw in Chromium’s md_browser Tool.Mar 22Mar 22
Building OSX Chrome HarvesterUnderstanding Chrome password security by building an OSX malware that steals passwords stored in Chrome.Jan 14Jan 14
Step-by-Step Guide to Creating a Kali Linux VM in VMware Fusion (2025)Updated Instructions for Setting Up a Kali Virtual Machine on macOSJan 11Jan 11
PicoCTF — Bloat.pySolution to PicoCTF Reverse Engineering Challenge — Bloat.pyDec 11, 2024Dec 11, 2024
PicoCTF — Secret of the PolyglotSolution to PicoCTF Forensics Challenge — Secret of the PolyglotJul 15, 20241Jul 15, 20241