PinnedManipulating AES Traffic using a Chain of Proxies and Hardcoded KeysIntercepting and Manipulating client-side AES encrypted traffic in mobile applications having hardcoded Key and IVDec 3, 2022·6 min read
Naive Receiver - Damn Vulnerable DeFi #02Analysis and PoC of Damn Vulnerable DeFi Level 02 - Naive ReceiverJan 21, 2023·2 min read
Unstoppable - Damn Vulnerable DeFi #01Analysis and PoC of Damn Vulnerable DeFi Level 01 - UnstoppableJan 7, 2023·2 min read
Ethernaut Level 27 - Good SamaritanAnalysis and solution for Ethernaut's Level 27 - Good Samaritan, with Solidity and FoundryOct 17, 2022·5 min read
Ethernaut Level 26 - DoubleEntryPointAnalysis and solution for Ethernaut's Level 26 - DoubleEntryPoint, with Solidity and FoundryOct 15, 2022·12 min read
Ethernaut Level 25 - MotorbikeAnalysis and solution for Ethernaut's Level 25 - Motorbike, with Solidity and FoundrySep 10, 2022·5 min read
Ethernaut Level 24 - Puzzle WalletAnalysis and solution for Ethernaut's Level 24 - Puzzle Wallet, with Solidity and FoundrySep 8, 2022·8 min read