Exploring the Depths of Computers and Electronics

About Me




I have written a few other blog posts that cover topics such as: Vulnerability Research, Reverse Engineering, Exploit Development, Computer Architecture, and Programming. These posts can be viewed here.

These are mostly introductory posts that will be expanded as time goes on, and are currently written to help someone with very little knowledge in the field be able to get their feet wet.

Glowing Keyboard

This walkthrough will give a light background to some basic reverse engineering techniques that would help with CTF challenges.


This is the a series of blog posts which I began to help someone get into the field of Vulnerability Research and also teach a bit of basic exploitation basics.

I have created and hosted a couple of fun Reverse Engineering challenges for the Bitcamp2019 hackathon on my Github, which you can find here.

I hope to have a couple more added before the end of the event as well as some Exploitation challenges as well!

If you are able to solve any of the challenges, see me at my Bitcamp Booth or shoot me an email!

In an effort to gain a better understanding of Vulnerability Research, I have recently begun creating a tutorial and challenge based VM that will teach the basics of Exploitation, Reverse Engineering, and Linux Fundamentals. I am currently looking to expand this work by collaborating with others who have prior experience with creating tutorials or CTFs to help bring this project to light.

The source code can be found here.

Tutorials and Blog Posts can be found here.



Washington, DC, USA

Blue Keyboard

©2020 by Emtuls