🔹 IT student passionate about binary exploitation, reverse engineering, and low-level systems development.
🔹 Aspiring Vulnerability Researcher and Exploit Developer.
🔹 Currently learning binary exploitation techniques and diving into kernel development & exploitation.
- TibaneC2 → A custom red team Command & Control (C2) framework
- Status: Under active development
- Binary Exploitation CTF Writeups - Writeups and solutions for binary exploitation (pwn) ctf challenges I solved