About
Hi β Iβm Zohir (aka π½!π»)
Iβm 20 years old and I study in my third year at ESTIN (Higher School of Computer Science & Technology).
Iβm a CTF player, a curious tinkerer, and someone who gets weirdly excited by crash dumps and stubborn bugs.
Iβve been to 150+ CTF events and those hours of puzzling built my habits: try fast, fail often, and learn the one trick that makes the next exploit click. But speed isnβt the whole story β I also slow down to actually understand real binaries, OS behavior, and why things fail the way they do.
How I got here
It started with puzzles β picoCTF, TryHackMe, the little wins that teach you how to think. The puzzles opened doors: static reversing, quick dynamic checks, and then the deeper questions about why a program behaved the way it did.
From there I moved into OS internals and reversing. Studying internals felt like learning the machineβs grammar: once you know the rules, you can ask better questions. That naturally led to exploring how those rules can be bent or broken β and thatβs how exploitation, kernel attack surfaces, and eventually malware development entered the picture.
Iβm not doing this for drama. I do it because I want to understand β both how the system works and how it can be misused β so I can design better defenses and build stronger, safer tools.
What I study & practise
- Windows internals: debugging processes/threads, tracing module loads, following handles, reproducing crashes and turning them into explanations. I learn by doing β experiment, instrument, and write down the exact steps so I donβt forget.
- Reverse engineering: static + dynamic, function β flow β structure. CTF writeups train speed; real binaries train patience.
- forensics (4n6): quick triage checklists, finding injected or hollowed processes, extracting artifacts that reveal truth when files vanish.
- Malware development & analysis: Iβm a maldev student and researcher β building small, controlled lab tests to explore persistence, communication, evasion, and how analysts detect or miss behavior.
- Exploitation goals: kernel abusing and Windows privilege/kernel exploitation β this is where I want to get very good.
Where I practise (some of my playgrounds)
- picoCTF β https://play.picoctf.org/users/zx41r
- TryHackMe β https://tryhackme.com/p/Zx41R
- CyberDefenders β https://cyberdefenders.org/p/Zx41R/
- I also learn from pwn.college-style practicals, practical OS exercises, and a lot of hands-on reversing labs.
A short, honest line
I study every day. I research. I break things in a lab so I can put them back together with notes. Iβm learning kernel abuse and Windows exploitation because thatβs the hardest, messiest part that actually matters in the real world β and I love the work even when itβs frustrating.
Want to follow or reach out?
- GitHub: https://github.com/ZX41R
- LinkedIn: https://www.linkedin.com/in/hakmi-zohir-87b896299
- picoCTF / TryHackMe / CyberDefenders links above
If you want to trade notes, test an idea, or just rant about an impossible bug β hit me up. Iβm always learning and happy to share what Iβve found.