Skip to main content
Pranav Krishna

Pranav Krishna

Aspiring Exploit Developer

Recent

holy cow - pwnme25
·975 words·5 mins
V8 Hole
Introduction: # This is the writeup for the pwnmeCTF 2025 challenge called holy cow revenge². This one is going to be crisp and quick.
v8 - ArrayShift Race Condition
·2123 words·10 mins
Browser V8 Arrayshift Turbofan
In this post, we’ll explore how to exploit a race condition in the V8 JavaScript engine, between the turbofan thread and the main thread that executes ArrayShift builtin function.
CVE-2024-0517 Quick Blog
·1337 words·7 mins
Browser V8 Maglev
This post explores a vulnerability found in the Maglev optimizing compiler of V8, specifically within a function responsible for optimizing classes that inherit from a parent class.
expm1-35C3 - Bug/ Optimizations Analysis
·1734 words·9 mins
Math.expm1 Typer OOB
In this post, we’ll dive deep into a fascinating bug in the V8 JavaScript engine that arises from the mishandling of the Math.expm1(-0) function during the optimization process.
Tallocator [bi0sCTF 2024]
·2401 words·12 mins
Bi0sctf Android Reverse_Shell
I created an Android based pwn challenge that involes exploiting a dynamic memory allocator using the webview interface.
evalbox - pyjail writeup
·871 words·5 mins
Pyjail Pwn Ptr-Yudai
This was a particularly unique and well-designed PyJail challenge featured in the Asian Cyber Security Challenge. Although I solved it during the contest using an unintended method.