<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
    <channel>
      <title>aksh79</title>
      <link>https://aksh79.github.io/writeups</link>
      <description>Last 10 notes on aksh79</description>
      <generator>Quartz -- quartz.jzhao.xyz</generator>
      <item>
    <title>HEAP 0</title>
    <link>https://aksh79.github.io/writeups/PicoCTF/binary-exploitation/HEAP-0</link>
    <guid>https://aksh79.github.io/writeups/PicoCTF/binary-exploitation/HEAP-0</guid>
    <description><![CDATA[ Are overflows just a stack concern? the program prints address and value of two strings allocated on the heap: save_var and input_data (initialized to bico and pico respectively). ]]></description>
    <pubDate>Sat, 21 Feb 2026 03:43:21 GMT</pubDate>
  </item><item>
    <title>Flag Hunters</title>
    <link>https://aksh79.github.io/writeups/PicoCTF/reverse-engineering/Flag-Hunters</link>
    <guid>https://aksh79.github.io/writeups/PicoCTF/reverse-engineering/Flag-Hunters</guid>
    <description><![CDATA[ Lyrics jump from verses to the refrain kind of like a subroutine call. There’s a hidden refrain this program doesn’t print by default. ]]></description>
    <pubDate>Sat, 21 Feb 2026 03:43:21 GMT</pubDate>
  </item><item>
    <title>aksh79&#039;s writeups</title>
    <link>https://aksh79.github.io/writeups/</link>
    <guid>https://aksh79.github.io/writeups/</guid>
    <description><![CDATA[ My write-ups for security ctf challenges and other labs. Check my obsidian notes at aksh79.github.io/infosec-garden. ]]></description>
    <pubDate>Sat, 21 Feb 2026 03:43:21 GMT</pubDate>
  </item><item>
    <title>sandboxing</title>
    <link>https://aksh79.github.io/writeups/pwn.college/sandboxing</link>
    <guid>https://aksh79.github.io/writeups/pwn.college/sandboxing</guid>
    <description><![CDATA[ filesystem sandboxing chroot-escape-basic int main(int argc, char **argv, char **envp) { assert(argc &gt; 0); setvbuf(stdin, NULL, _IONBF, 0); setvbuf(stdout, NULL, _IONBF, 1); assert(argc &gt; 1); char jail_path[] = &quot;/tmp/jail-XXXXXX&quot;; assert(mkdtemp(jail_path) != NULL); printf(&quot;Crea... ]]></description>
    <pubDate>Sat, 21 Feb 2026 03:43:21 GMT</pubDate>
  </item><item>
    <title>readme</title>
    <link>https://aksh79.github.io/writeups/readme</link>
    <guid>https://aksh79.github.io/writeups/readme</guid>
    <description><![CDATA[ my write-ups for security ctf challenges and other labs, and content for writeups hosted at writeups. ]]></description>
    <pubDate>Sat, 21 Feb 2026 03:43:21 GMT</pubDate>
  </item><item>
    <title>haunted library</title>
    <link>https://aksh79.github.io/writeups/DeadFace-CTF-2025/pwn/haunted-library</link>
    <guid>https://aksh79.github.io/writeups/DeadFace-CTF-2025/pwn/haunted-library</guid>
    <description><![CDATA[ DEADFACE appear to be using this program as a way to let potential new recruits view info on their server, while restricting access to more important files… I tried my hand at it, but i didnt get too far before hitting a wall. ]]></description>
    <pubDate>Wed, 29 Oct 2025 05:17:38 GMT</pubDate>
  </item><item>
    <title>locked out</title>
    <link>https://aksh79.github.io/writeups/DeadFace-CTF-2025/pwn/locked-out</link>
    <guid>https://aksh79.github.io/writeups/DeadFace-CTF-2025/pwn/locked-out</guid>
    <description><![CDATA[ We found this program on one of the old drives DEADFACE threw out. ]]></description>
    <pubDate>Wed, 29 Oct 2025 05:17:38 GMT</pubDate>
  </item><item>
    <title>PIE TIME</title>
    <link>https://aksh79.github.io/writeups/PicoCTF/binary-exploitation/PIE-TIME</link>
    <guid>https://aksh79.github.io/writeups/PicoCTF/binary-exploitation/PIE-TIME</guid>
    <description><![CDATA[ Can you try to get the flag? Beware we have PIE! Additional details will be available after launching your challenge instance. ]]></description>
    <pubDate>Tue, 28 Oct 2025 21:08:39 GMT</pubDate>
  </item><item>
    <title>echo chamber</title>
    <link>https://aksh79.github.io/writeups/DeadFace-CTF-2025/pwn/echo-chamber</link>
    <guid>https://aksh79.github.io/writeups/DeadFace-CTF-2025/pwn/echo-chamber</guid>
    <description><![CDATA[ DEADFACE loves their vintage tech, but their “Echo Chamber” chat bot has a critical flaw from the old days. ]]></description>
    <pubDate>Mon, 27 Oct 2025 17:55:44 GMT</pubDate>
  </item><item>
    <title>Cap</title>
    <link>https://aksh79.github.io/writeups/HackTheBox/challenges/android/Cap</link>
    <guid>https://aksh79.github.io/writeups/HackTheBox/challenges/android/Cap</guid>
    <description><![CDATA[ Easy leaks we have a cat.ab file. ]]></description>
    <pubDate>Mon, 27 Oct 2025 17:55:44 GMT</pubDate>
  </item>
    </channel>
  </rss>