Wireless Keyboard Signal Interception
My analysis of encryption weaknesses in wireless keyboard protocols, with practical demonstration of keylogging attack vectors.
My analysis of encryption weaknesses in wireless keyboard protocols, with practical demonstration of keylogging attack vectors.
Analysis of common JWT vulnerabilities with practical examples of token manipulation and signature bypass techniques.
My methodology for testing GraphQL endpoints for information disclosure, query depth attacks, and injection vulnerabilities.
My analysis of the winning exploits from Pwn2Own 2025, breaking down the techniques used to compromise Chrome and Safari.
Step-by-step walkthrough of my approach to compromise the ShadowCorp machine, combining SSRF, container escape, and privilege escalation.
My solutions for the three binary exploitation challenges from DEFCON CTF qualifiers, including ROP chain development and heap exploitation.
Hi, I'm Sarah (@cybrgrl0xf), a security researcher and ethical hacker focused on finding vulnerabilities before the bad actors do. With a background in software engineering and a passion for breaking things, I spend my time hunting bugs, reversing binaries, and competing in CTFs.
By day, I work as a senior penetration tester. By night, I research emerging attack vectors and contribute to open-source security tools. This blog documents my journey, findings, and occasional victories in the constantly evolving security landscape.