security researcher
hi, i'm r00t26.
i break things
and write about it.
Security engineer · security researcher. I document my findings, build open-source tools, and share writeups.
~/$ whoami
security engineer · researcher · perpetual tinkerer
~/$ cat interests.txt
web exploitation, network exploitation, reverse engineering, osint
~/$ ls -la ./certs
Security+, Pentest+, CEH, CISSP
~/$ _
Pwning the Protector — CVE-2025-69258
A breakdown of CVE-2025-69258, an unauthenticated RCE vulnerability in Trend Micro Apex Central c...
React2Shell — CVE-2025-55182
A breakdown of CVE-2025-55182, a CVSS 10.0 unauthenticated RCE vulnerability.
WSUS RCE — CVE-2025-59287
A breakdown of CVE-2025-59287, a CVSS 9.8 unauthenticated RCE vulnerability in Windows Server Upd...
SQL Injection to RCE
Exploiting a blind SQL injection vulnerability to leak credentials, then chaining it with a file ...
SQL Injection to RCE
Exploiting a blind SQL injection vulnerability to leak credentials, then chaining it with a file ...
latest posts
view all →- 2025-01-04 The Fundamentals of Hashing
- 2025-01-03 Transmission Control Protocol (TCP)
- 2025-01-02 Simple Network Management Protocol (SNMP)
- 2025-01-01 Domain Name System (DNS)
- 2024-01-20 Understanding JWT Algorithm Confusion Attacks