2026.04.08
ResearchSAST
Semgrep Architecture: Comprehensive Reference
A deep technical reference on how Semgrep works internally - from CLI entry-point and target discovery, through parsing, AST normalisation, pattern matching and taint dataflow analysis, to output formatting.
17 min
2026.03.29
CTFReverse Engineering
Une nuit pour hacker 2026: Thread of Doom
Executive Summary Challenge: Thread of Doom Category: Reverse Engineering Flags: NHK26{VirtualProtect_Overwritten} Binary: NHK_CrackMe_V3.exe (PE32, x86, 43520 …
18 min
2026.02.07
0daySSRF
Enketo 6.2.1 - Auth-Bypass, SSRF, and XXE Browser Abuse to File Read
This article is the result of an OffenSkill Training. It discusses an unauthenticated arbitrary file read vulnerability found in the Enketo software, a web survey manager. The vulnerability, found during a white-box code review session, allows an unauthenticated attacker to read any arbitrary file on the server's by chaining an auth bypass, SSRF, XXE in svg and browser abuses.
10 min
2025.09.21
CTFWeb Security
Amazon AppSec CTF: HalCrypto
Executive Summary Challenge: HalCrypto Category: Web Security Vulnerability: JWT validation bypass via URL confusion with @ symbol Impact: Authentication bypass …
6 min
2025.09.21
CTFWeb Security
Amazon AppSec CTF: PageOneHTML
Executive Summary Challenge: PageOneHTML Category: Web Security Vulnerability: Server-Side Request Forgery (SSRF) via gopher:// protocol Impact: Access to …
5 min
2025.08.05
ResearchCPG
Understanding Code Property Graphs
When I first started developing tools for source code auditing, my primary need was to track tainted data flows through complex codebases during manual code …
22 min