Hi, Itsmanikandan73 👋

Vulnerability researcher building expertise in binary exploitation and reverse engineering.

About

I build vulnerable systems, break them, and understand why they fail at the machine level. My focus is on low-level exploitation: buffer overflows, shellcode development, and reverse engineering with GDB.

Currently deep-diving into stack-based exploitation while exploring emerging attack vectors in AI systems.

What i build

Technical Stack

Security Insights

On Memory Safety

Understanding why 'scanf("%s")' is dangerous requires understanding stack frames. It's not about the function, it's about unchecked memory writes.

On AI Security

AI systems are like pointers to the internet. Just as you can manipulate a pointer to redirect execution flow, you can manipulate AI context to redirect behavior. One precise prompt injection is all it takes.

On Learning

Rebuilding ls taught me more about filesystems than any tutorial. Build it vulnerable, exploit it yourself, understand the root cause.

Active On

Currently

Connect

#connect@terminal:~

x86owl@sudo_init_3:~$ whoami

GitHub: https://github.com/Itsmanikandan73

status: Building in public. Thinking across domains. One exploit at a time

x86owl@sudo_init_3:~$ _