n8n CVE-2025-68613: When Workflow Automation Goes Wrong
A comprehensive look at CVE-2025-68613 in n8n - how expression injection can lead to remote code execution and what you can do to protect yourself.
Windows internals · unpacking · dynamic analysis
I break binaries to understand how malware evades detection. Each analysis documents the methodology: which hypotheses failed, why specific tools proved effective, and how evasion techniques actually work.
The focus is on unpacking protected executables, defeating anti-analysis measures, and making reverse engineering decisions transparent. Analysis over speculation.
Member of k0mrads CTF team
Get notified when I publish new analysis. No spam, unsubscribe anytime.
A comprehensive look at CVE-2025-68613 in n8n - how expression injection can lead to remote code execution and what you can do to protect yourself.
Systematic reverse engineering approach for unprotected ELF binaries using static analysis techniques and Ghidra decompilation
A comprehensive blue team investigation walkthrough of the TryHackMe Web Attack Forensics room, analyzing malicious web activity and command injection attacks using Splunk.
Detailed writeups for mobile security challenges from NahamCon Winter CTF 2025, covering Android APK reverse engineering, vulnerability analysis, and exploitation techniques.
Pure disassembly and no-execution analysis using Ghidra, IDA, and decompilation techniques
A comprehensive guide to understanding obfuscation techniques for malware evasion, from basic concatenation to advanced control flow manipulation. Learn how attackers hide their code and how defenders can spot these techniques.
Systematic reverse engineering approach for unprotected ELF binaries using static analysis techniques and Ghidra decompilation
Reverse engineering challenge involving static analysis of a stripped ELF binary with anti-debugging measures and XOR-based authentication.
A comprehensive guide to x86 CPU architecture fundamentals essential for malware reverse engineering. Learn about registers, memory layout, and stack operations that form the foundation of system exploitation.
CVE analysis and exploit technique research
A hands-on walkthrough of TryHackMe's cURL exploitation room - learning HTTP requests, POST data, cookies, sessions, and brute force attacks from the command line.
A comprehensive look at CVE-2025-68613 in n8n - how expression injection can lead to remote code execution and what you can do to protect yourself.
A friendly walkthrough of Django CVE-2025-64459 - understanding and exploiting ORM query parameter injection vulnerabilities in web applications.
Log analysis, network forensics, and attack reconstruction case studies
Network forensics challenge analyzing FTP traffic to identify compromised credentials during a Krampus Syndicate intrusion attempt.
A comprehensive blue team investigation walkthrough of the TryHackMe Web Attack Forensics room, analyzing malicious web activity and command injection attacks using Splunk.
Short observations, pattern notes, and methodology tips from analysis work.
Overview of modern binary security protections and bypass techniques
Understanding heap memory allocation and its characteristics
Common heap exploitation methods including overflow and use-after-free
A comprehensive guide to x86 CPU architecture fundamentals essential for malware reverse engineering. Learn about registers, memory layout, and stack operations that form the foundation of system exploitation.
A comprehensive guide to understanding obfuscation techniques for malware evasion, from basic concatenation to advanced control flow manipulation. Learn how attackers hide their code and how defenders can spot these techniques.
A comprehensive walkthrough of TryHackMe's Cyber Kill Chain room, exploring each phase of cyber attacks from reconnaissance to actions on objectives, plus a real-world analysis of the Target data breach.
A hands-on walkthrough of TryHackMe's cURL exploitation room - learning HTTP requests, POST data, cookies, sessions, and brute force attacks from the command line.
A comprehensive look at CVE-2025-68613 in n8n - how expression injection can lead to remote code execution and what you can do to protect yourself.
Web exploitation challenge targeting a malicious e-commerce platform with cookie manipulation and privilege escalation vulnerabilities.
_____ _ _ _ _
|_ _| |__ ___ ___ ___ __| | | |__ __ _ __| |
| | | '_ \ / _ \ / __/ _ \ / _` | | '_ \ / _` |/ _` |
| | | | | | __/ | (_| (_) | (_| | | | | | (_| | (_| |
|_| |_| |_|\___| \___\___/ \__,_| |_| |_|\__,_|\__,_|
You found the secret! True hacker spirit detected.
> Analyzing binary...
> Signature detected: ELITE_HACKER
> Access level: MAXIMUM
> Status: PWNED 🔓