About

Table of Contents

👋 Welcome to byte jmp

byte jmp is a personal blog — from the first HTTP request to the last ret instruction before the system crashes.

This is a place for curiosity, experimentation, and technical growth. Here you’ll find write-ups, research, and study notes that explore the entire stack — from web exploitation and application logic flaws, to reverse engineering, memory corruption, and low-level internals.

📚 Topics You’ll Find Here

  • 🔍 CTF Write-ups: Challenges solved and lessons learned from competitions.
  • 🧪 Security Research: Practical experiments, vulnerability analysis, and misconfiguration breakdowns.
  • 🖥️ Reverse Engineering: Disassembly, debugging, and binary exploration.
  • 🌐 Web Security: XSS, SQLi, IDORs, and more from the application layer.
  • 🧠 Low-Level Concepts: Shellcode, assembly, memory layouts, syscall abuse, and more.
  • ⚙️ Tools & Techniques: Tips for Ghidra, GDB, Burp Suite, custom scripts, and beyond.

🕳️ Why “byte jmp”?

Because sometimes… one byte is all it takes to jump into shell.
A tribute to jmp, ret, and every beautiful crash along the way.

“In memory we trust. All else — we disassemble.”