BLOG

Security Research

CTF writeups · Web exploitation ·

From LFI to RCE via Log Poisoning

Chaining a basic local file inclusion in a PHP app all the way to an interactive reverse shell using Apache log poisoning.

SSTI to RCE: Bypassing Jinja2 Filters

A deep dive into server-side template injection in a Flask app — finding, exploiting, and crafting filter-bypass payloads.