Articles
2023
Trusted 2
HackDay 2023
Cryptography
ECDSA nonce reuse
Trusted
HackDay 2023
Cryptography
Length extension attack to forge a valid hash
Taurus ACS
HackDay 2023
Reverse
Tauri application reverse
Nanomachine
HackDay 2023
Reverse
Serial code verification based on equations
Gate
HackDay 2023
Web3
Privileges check bypass and storage slot computation
Disclosure
HackDay 2023
Web3
Recovery of deployed contract address and inspection of NFTs metadata on IPFS
Diamond
HackDay 2023
Web3
Exploitation of tx.origin and delegatecall to steal ERC20 tokens
Defuser
HackDay 2023
pwn
tcache poisonning with safe linking
2022
Trucha bug
Root-Me CTF
Crypto
RSA signature bypass due to vulnerable implementation
RPN
Root-Me CTF
Prog
Reverse polish notation expressions computation
DFS
Root-Me CTF
Prog
Depth first search algorithm application on an oriented graph
Physics quizz speedrun
Root-Me CTF
Prog
Websocket based physics quizz automation
Easy XOR
Root-Me CTF
Crypto
Hamming distances computation and frequency analysis to recover an unknown XOR encoded message
CVE finder engine
Root-Me CTF
Web
CQL injection and database leak into incremental ASCII hash bruteforce
Base on fire
Root-Me CTF
Web
Firestore security rules misconfiguration
Protonic vault
Root-Me CTF
Reverse
Bytenode encoded Electron application bypass
Gate keeper
Root-Me CTF
Reverse
eBPF rootkit analysis
They always think they got it
HeroCTF v4
Blockchain
Computation of the slot number used to store our guess number in the contract’s storage
Ready to hack
HeroCTF v4
Blockchain
Solidity smart contract vulnerable to re entrancy
Deadalus
HeroCTF v4
Prog
Find the number of loops in each maze with a recursive search