✨ Neovim for life ✨
Konnichiwassup! I'm mostly into CTFs and Python development, currently learning Go and ReactJS. In my free time, I attempt to work on my many unfinished projects (but end up over-configuring my init.vim instead).
If I'm not busy mugging for my studies, you can usually find me playing in CTFs over the weekend.
I main web and pwn, and the occasional low-hanging crypto challenge. Also have some decent experience with Pyjails!
- YCEP - 3rd place
- MetaRed CTF - 1st place
- idekCTF - 3rd place in academic category
- VU Cyberthon - 9th place
- CTF.SG - 6th place
- Sieberrsec - 3rd place
- Whitehacks - 3rd place
- Imperial CTF - 13th place
- Winja CTF - 3rd place
- YCEP - 1st place
- Codegate 2022 Finals - 4th place
- STACK the Flags 2022 (JC Category) - 3rd place
- Sieberrsec 2023 (Secondary Category) - 1st place
CTF-cord is a Discord bot that aims to meet all your CTF needs (excluding solving the challs for you)
CTF-cord's backbone is CTFtime. To be honest, I really started off just wanting to scrap CTF data from CTFtime and display it in an embed.
Currently, it has many more features, including:
- CTF channel and scheduled event management
- Automated reminders
- Weekly CTFtime upcoming-CTFs updates
- Point distribution calculation + member percentage contribution
Here's the invite, feel free to add it to your server :) The bot will be hosted indefinitely, but if it happens to be down someday, you can always clone the repo and host it on your own VPS.
Still undergoing development, feel free to suggest new features ✨ or report any bugs 🪳
ffuzzer is a CLI format-string fuzzer for CTF Pwn challenges. Its use case is pretty niche, specifically full RELRO format string challs with buffer overflow.
However, it does find your offset as well, which can be applied to general format string writes (nothing that Pwntools can't already do).
Ultimately, this tool aims to make format string exploitation as easy as can be, with the help of Pwntools.
It can fuzz:
- Offset of input on stack
- Canary offset (pretty accurate!)
- PIE base (pretty accurate!)
- Custom strings
The main selling point of this tool is basically the no-scripting-required fuzzing.
In this tool, usage is very intuitive: Make your way to the format string vuln in an interactive repl and copy-paste the provided payload. That's it.
Once the program detects the format-string leak, it will automatically start fuzzing.
Check out the link in the header for more details!