<feed xmlns="http://www.w3.org/2005/Atom"> <id>/</id><title>V3in</title><subtitle>A collection of CTF writeups, security notes, and practical insights on binary exploitation, reverse engineering, and other cybersecurity topics.</subtitle> <updated>2026-04-23T13:58:59+00:00</updated> <author> <name>V3in</name> <uri>/</uri> </author><link rel="self" type="application/atom+xml" href="/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 V3in </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Jeanne Hack CTF 2026 - Pokedex</title><link href="/posts/jeanne-hack-ctf-pokedex/" rel="alternate" type="text/html" title="Jeanne Hack CTF 2026 - Pokedex" /><published>2026-04-23T11:00:00+00:00</published> <updated>2026-04-23T13:18:25+00:00</updated> <id>/posts/jeanne-hack-ctf-pokedex/</id> <content type="text/html" src="/posts/jeanne-hack-ctf-pokedex/" /> <author> <name>V3in</name> </author> <category term="Pwn" /> <summary>CTF: Jeanne Hack CTF 2026 Challenge Description Professor Oak has developed a new prototype of the Pokédex, but something seems off… The goal is to analyze the binary, identify vulnerabilities, and achieve code execution. First look We are given a classic CTF-style binary that provides a menu-based interface, allowing us to: Catch Pokémon (allocate heap memory) Edit Pokémon data Re...</summary> </entry> </feed>
