Hi, Itsmanikandan73 👋
Vulnerability researcher building expertise in binary exploitation and reverse engineering.
About
I build vulnerable systems, break them, and understand why they fail at the machine level. My focus is on low-level exploitation: buffer overflows, shellcode development, and reverse engineering with GDB.
Currently deep-diving into stack-based exploitation while exploring emerging attack vectors in AI systems.
What i build
-
Exploitation tools
- Custom bind shell with daemon functionality.
- Exploit automation scripts and payload generators.
- Buffer overflow testing frameworks.
-
System Utilities(from scratch)
- ls - Understanding filesystem metadata and permissions.
- cat, shell - Process management and I/O redirection.
-
Research Projects
- Prompt injection experiments and AI security testing.
- Cross-domain vulnerability analysis.
Technical Stack
- Exploitation: C, x86 Assembly (NASM), GDB, bash, Python [exploit + scripting]
- Focus Areas:Binary exploitation, reverse engineering, memory corruption, AI security
- Concepts:Linux internals, socket programming, shellcode development
Security Insights
On Memory Safety
Understanding why 'scanf("%s")' is dangerous requires understanding stack frames. It's not about the function, it's about unchecked memory writes.
On AI Security
AI systems are like pointers to the internet. Just as you can manipulate a pointer to redirect execution flow, you can manipulate AI context to redirect behavior. One precise prompt injection is all it takes.
On Learning
Rebuilding ls taught me more about filesystems than any tutorial. Build it vulnerable, exploit it yourself, understand the root cause.
Active On
- pwn.college: Buffer overflow challenges
- CryptoHack: Cryptographic vulnerabilities
- Custom labs: Self-built exploitation environments
- AI security research: Prompt injection and context manipulation
Currently
- Reading: Head First C, Programming from the Ground Up
- Focus: Stack buffer overflows → shellcode injection → protection bypasses
- Side interest: Geometry, mathematical proofs
Connect
x86owl@sudo_init_3:~$ whoami
GitHub: https://github.com/Itsmanikandan73
status: Building in public. Thinking across domains. One exploit at a time
x86owl@sudo_init_3:~$ _