About
Table of Contents
👋 Welcome to byte jmp
byte jmp is a personal blog — from the first HTTP request to the last ret
instruction before the system crashes.
This is a place for curiosity, experimentation, and technical growth. Here you’ll find write-ups, research, and study notes that explore the entire stack — from web exploitation and application logic flaws, to reverse engineering, memory corruption, and low-level internals.
📚 Topics You’ll Find Here
- 🔍 CTF Write-ups: Challenges solved and lessons learned from competitions.
- 🧪 Security Research: Practical experiments, vulnerability analysis, and misconfiguration breakdowns.
- 🖥️ Reverse Engineering: Disassembly, debugging, and binary exploration.
- 🌐 Web Security: XSS, SQLi, IDORs, and more from the application layer.
- 🧠 Low-Level Concepts: Shellcode, assembly, memory layouts, syscall abuse, and more.
- ⚙️ Tools & Techniques: Tips for Ghidra, GDB, Burp Suite, custom scripts, and beyond.
🕳️ Why “byte jmp”?
Because sometimes… one byte is all it takes to jump into shell.
A tribute to jmp
, ret
, and every beautiful crash along the way.
“In memory we trust. All else — we disassemble.”