Skip to main content

Knowledge Base

Documenting the intersection of cybersecurity, advanced mathematics, and system internals.

Egypt National CTF 2025: Smart Move
Egypt National CTF 2025: Smart Move

A research-based approach to breaking Elliptic Curve Cryptography defined over the ring $Z_p^3$ using the Smart-Satoh-Araki p-adic lifting attack.

Egypt National CTF 2025: PrivExec
Egypt National CTF 2025: PrivExec

An in-depth analysis of a SUID binary logic flaw where unsafe environment variable parsing enables arbitrary file read and full root compromise.

Egypt National CTF 2025: Keep Them On Their Toes
Egypt National CTF 2025: Keep Them On Their Toes

A detailed technical walkthrough of Linux privilege escalation via sudoers env_keep misconfiguration and BASH_ENV environment injection.

هندسة الخصوصية: بناء أنظمة تحترم بيانات البشر
هندسة الخصوصية: بناء أنظمة تحترم بيانات البشر

دليل عملي لهندسة الخصوصية، يشمل الخصوصية منذ التصميم، الامتثال القانوني، تقنيات تعزيز الخصوصية، والتطبيقات الواقعية.

Privacy Engineering: Building Systems That Respect Human Data
Featured Privacy Engineering: Building Systems That Respect Human Data

A practical guide to Privacy Engineering, covering privacy-by-design, legal compliance, privacy-enhancing technologies, and real-world implementation.

Host Security Hardening Playbook: Fedora Edition
Featured Host Security Hardening Playbook: Fedora Edition

A comprehensive, defense-in-depth SOP for hardening Fedora Linux workstations. Covers Kernel self-protection, SELinux enforcement, network isolation, and persistence hunting.