Posts by Category
Hardware
Design & Weaponize Your Customized HID Attack Boards
Some schematics I designed in 2018 to achieve an HID attack and weaponize usb cables or devices...
Plug & Pwn
Explaining the HID attack tools, weaponizing techniques and how you can build yours from a hardware prespective...
Writeups
IEEE Victoris 2023 CTF - VulnPass
Writeup for the memory fornensics challenge authored for the IEEE Victoris 2023 CTF
ICMTC 2023 CTF Finals - MegaMind
Writeup for a digital fornensics challenge authored for the ICMTC 2023 CTF Finals