
I’m an offensive security researcher with a passion for finding and exploiting vulnerabilities in web applications, networks, and systems. This blog serves as a portfolio of my work, showcasing CTF write-ups, vulnerability research, and insights from the frontlines of cybersecurity.
Technical Skills
- Penetration Testing: Web applications, network infrastructure, API security
- Exploit Development: Binary exploitation, shellcode development, ROP chains
- Programming: Python, Bash, C, JavaScript, PowerShell
- Tools & Frameworks: Burp Suite, Metasploit, Cobalt Strike, Bloodhound, Impacket
Certifications
Offensive Security:
- OffSec Certified Professional+ (OSCP+)
- OffSec Experienced Penetration Tester (OSEP)
- OffSec Web Expert (OSWE)
CompTIA:
Other:
Areas of Focus
- Web Application Security (OWASP Top 10, API vulnerabilities)
- Active Directory & Windows exploitation
- Binary exploitation and reverse engineering
- Red Team operations and adversary simulation
- Bug bounty hunting
What You’ll Find Here
This blog is a mix of:
- CTF Write-ups: Detailed walkthroughs of Capture The Flag challenges from platforms like HackTheBox, TryHackMe, and CTF competitions
- Vulnerability Analysis: Commentary on the latest CVEs, zero-days, and security incidents
- Security Tutorials: Practical guides and techniques for penetration testing and exploit development
- Research: My own vulnerability discoveries and security research projects
Why I Do This
I believe in the power of offensive security to make systems stronger. Every vulnerability found is an opportunity to improve defenses. I’m passionate about learning, sharing knowledge, and contributing to the security community.
Contact me
Interested in working together or have questions? Reach out!
- Email: [email protected]
- Twitter: @MasePrace93
- GitHub: masalepri98
- LinkedIn: masonaprince