// identity node — security researcher
H4CKXEL
Z3R0 C00L  /  ALMOST HUMAN

Just Another Hacker. Security Researcher. Bytes Addict.
Exploiting systems, writing about it, and occasionally touching grass.

Current host: 127.0.0.1 — Access level: ROOT

IDENTITY_CARD.bin
ENC-256
h4ckxel
alias z3r0 c00l // h4ckxel
role Ethical Hacker Learner
origin 127.0.0.1
status ● ONLINE
clearance ROOT
Z3R0 NET — ENCRYPTED CHANNEL 0x4831
ACCESS_TERMINAL //
access point
TERMINAL_
h4ckxel@z3r0:~$ SESSION ACTIVE
h4ckxel@z3r0:~$
type 'help' for available commands — tab to autocomplete
KNOWLEDGE_BASE //
knowledge base
WRITE_UPS & POSTS_
NODE_001
Playing with LD_PRELOAD
Introduction to the LD_PRELOAD environment variable and how it can be leveraged for hooking and injection.
READ ──>
NODE_002
Exploit 101 — Format Strings
Deep dive into format string vulnerabilities on Linux and how to exploit them step by step.
READ ──>
NODE_003
Code Injection with Python
How to inject a backdoor into a PE file using Python. Hands-on binary manipulation.
READ ──>
ALL_NODES
All Write-Ups
Collection of CTF write-ups, pentesting notes and security research published on the blog.
VIEW ALL ──>