cybrgrl@nexus:~$
cybrgrl@nexus:~$ ./welcome.sh
██████╗██╗ ██╗██████╗ ███████╗██████╗ ███╗ ██╗███████╗██╗ ██╗██╗ ██╗███████╗ ██╔════╝╚██╗ ██╔╝██╔══██╗██╔════╝██╔══██╗ ████╗ ██║██╔════╝╚██╗██╔╝██║ ██║██╔════╝ ██║ ╚████╔╝ ██████╔╝█████╗ ██████╔╝ ██╔██╗ ██║█████╗ ╚███╔╝ ██║ ██║███████╗ ██║ ╚██╔╝ ██╔══██╗██╔══╝ ██╔══██╗ ██║╚██╗██║██╔══╝ ██╔██╗ ██║ ██║╚════██║ ╚██████╗ ██║ ██████╔╝███████╗██║ ██║ ██║ ╚████║███████╗██╔╝ ██╗╚██████╔╝███████║ ╚═════╝ ╚═╝ ╚═════╝ ╚══════╝╚═╝ ╚═╝ ╚═╝ ╚═══╝╚══════╝╚═╝ ╚═╝ ╚═════╝ ╚══════╝
cybrgrl@nexus:~$ whoami
Security Researcher | Bug Hunter | CTF Player
cybrgrl@nexus:~$ cat mission.txt
Welcome to my digital playground where I document my journey through cybersecurity research, vulnerability discoveries, and ethical hacking experiments.

Security Research

Wireless Keyboard Signal Interception

My analysis of encryption weaknesses in wireless keyboard protocols, with practical demonstration of keylogging attack vectors.

Exploiting JWT Implementation Flaws

Analysis of common JWT vulnerabilities with practical examples of token manipulation and signature bypass techniques.

Attacking GraphQL APIs

My methodology for testing GraphQL endpoints for information disclosure, query depth attacks, and injection vulnerabilities.

CTF Writeups & Challenges

Pwn2Own 2025 - Browser Exploitation

My analysis of the winning exploits from Pwn2Own 2025, breaking down the techniques used to compromise Chrome and Safari.

Hack The Box - ShadowCorp Machine

Step-by-step walkthrough of my approach to compromise the ShadowCorp machine, combining SSRF, container escape, and privilege escalation.

DEFCON CTF Quals - Binary Exploitation

My solutions for the three binary exploitation challenges from DEFCON CTF qualifiers, including ROP chain development and heap exploitation.

About Me

Hi, I'm Sarah (@cybrgrl0xf), a security researcher and ethical hacker focused on finding vulnerabilities before the bad actors do. With a background in software engineering and a passion for breaking things, I spend my time hunting bugs, reversing binaries, and competing in CTFs.

By day, I work as a senior penetration tester. By night, I research emerging attack vectors and contribute to open-source security tools. This blog documents my journey, findings, and occasional victories in the constantly evolving security landscape.

17
CVEs Published
32
CTF Wins
$74K
Bug Bounties