// 01●
CTF Write-ups & Research
Documented solutions and technical analysis from Capture The Flag competitions and independent vulnerability research.
CTFPenetration TestingWeb SecurityBinary ExploitationReverse Engineering
// internal · unpublished
// builds
Tooling, research, and write-ups.
Documented solutions and technical analysis from Capture The Flag competitions and independent vulnerability research.
A curated collection of SIEM detection rules mapped to MITRE ATT&CK techniques, covering common adversary TTPs in Windows and Linux environments.