Here you'll find my collection of achievements from Capture the Flag (CTF) competitions, discovered zero-day vulnerabilities, courses I'm learning, custom scripts, and certifications. Feel free to explore and take a look around!
Hiya! I'm k00l-beanz. I currently work as a vulnerability researcher, and I also enjoy penetration testing, reverse engineering, digital forensics, and competitive programming.
- 🔭 I’m currently working on: Enhancing my software analysis skills through Fuzzing with AFL++ and Variant Analysis with CodeQL.
- 🌱 I’m currently learning on: pwn.college, a great platform for learning security research. 🐐
- Hacking The Art of Exploitation
- The Web Application Hackers Handbook
- The Shellcoders Handbook
- The Art of Software Security Assessment
- (Jan. 13, 2025) Excessive memory allocation due to arbitrary offsets in Encapsulated ICAP header
- (Nov. 15, 2023) Integer Overflow / Wraparound in _pdfioValueRead & Heap Overflow
- (Nov. 13, 2023) Added missing initialization for ivlen
Current ctftime team: mad_b1ts
- PicoCTF 2024 - 1071 / 6957
- CSAW CTF Qualification Round 2023 - 385 / 1096
- HTB Rank: Hacker
- Global Ranking: #904
- User Owns: 69
- System Owns: 60
- Challenges: 44
- Reversing: 10
- Pwn: 8
- Web: 13
- Misc: 1
- Forensics: 5
- Mobile: 6
- OSINT: 1