River

  • Home
  • Archive
  • Categories
  • Tags
  • Search
  • 2026

  • 2026-02-10
    HackTheBox: Pterodactyl

    exploiting a Pterodactyl game panel via path traversal, PAM environment poisoning, and a udisks2 XFS resize bug to get root

  • 2026-02-04
    HackTheBox: Facts

    another post im not done writing lolzzzzz

  • 2026-01-28
    ROP Emporium: callme

    Chaining PLT calls with a multi-argument ROP gadget to invoke three functions in sequence

  • 2026-01-27
    ROP Emporium: split

    Building a ROP chain to call system() with a custom string argument

  • 2026-01-25
    ROP Emporium: ret2win

    Classic buffer overflow exploiting a vulnerable read() to redirect execution to a win function

  • 2025

  • 2025-12-09
    wordpress xml-rpc vulnerability on a gov't contractor

    wordpress & its subsequent dangers

  • 2025-07-18
    You Are Not a Victim of Fate

    Process Over Product

  • 2025-05-02
    picoCTF: Binary Instrumentation II

    Intercepting & monitoring Windows API calls to find a flag in a hidden buffer

  • 2025-05-01
    PicoCTF: Binary Instrumentation I

    Bypassing sleep functions using Frida

  • 2025-04-23
    picoCTF: FactCheck

    Reversing decompiled C++ code to extract a flag by tracing string manipulation logic

Page 1 of 3
Copyright © 2024-2026 River
  • Home
  • Archive
  • Categories
  • Tags
  • Search