Tal Simhayev

Logo

View My GitHub Profile

About Me

Hey there! I’m Tal Simhayev šŸ‘‹

I like to participate in CTF events with my team, mainly focused in categories like binary exploitation and reverse engineering (Scored 18th place in pingCTF-2023 - See below).
In addition, I worked together with my team to bypass modern defenses like ASLR, DEP, and PIE.

Projects

Exploited PrintDemon (CVE-2020-1048)

printDemon2system Exploit

Exploiting PrintDemon for Privilege Escalation (CVE-2020-1048)

šŸ„ Exploited Dirty COW (CVE-2016-5195)

root-dirtyc0w GIF

Privilege Escalation exploit: Exploiting Dirty COW for Root Access (CVE-2016-5195)

🐓 CloakRAT

KeyLogger (C/C++)

Implemented Linux shell

HashMap & LinkedList in C/C++

CTF Write-ups & Blogs

I regularly participate in CTF events with my team, C0d3-Bre4k3rs, focusing on binary exploitation and reverse engineering.
Below are some of my write-ups:

Flare-On 2024 Write-ups

pingCTF 2023 dangle-me pwn challenge write-up

dangle-me PoC GIF

pingCTF 2023 dangle-me exploit

ROP Emporium write4 - Blog

write4 GIF

ROP Emporium write4 exploit

šŸ“§ Contact

Feel free to connect with me on:
GitHub
LinkedIn