// security research & notes

Breaking things
carefully,
then writing
about it.

I'm Michelle — security engineer sharing pentesting research, study notes, and lessons from the field. Complex topics, approachable language.

CRTP · CEH · Published in Block Magnates · Guest on 她Ta Zhi Dao · Public notes on HackMD
Recent
Cybersecurity, Scammers, and Confidence
Guest on 她Ta Zhi Dao — how scammers collect your data, social engineering in Asia, and building confidence as a woman in security.
Podcast
My First On-Chain Hacking: Fallback
Solving Ethernaut's Fallback challenge — claiming contract ownership and draining funds by exploiting how Solidity handles fallback functions.
Article
Study Notes
Reference
CRTP Study Notes
Full AD red team kill chain — from AMSI bypass and domain enumeration to Kerberos attacks, persistence, and cross-forest trust abuse.
Cheatsheet
Exploiting Databases
SQL injection and exploitation reference for Oracle, MySQL, and PostgreSQL — from union-based extraction to RCE and WAF bypass.
Notes
Exploiting ViewState
ASP.NET deserialization to RCE via ysoserial.net — TypeConfuseDelegate and ActivitySurrogateSelector gadget chains explained.
About

Security engineer based in Taipei. I spend my days finding what's broken in systems and helping organizations understand what's actually at risk.

I believe the best security writing makes complex topics feel approachable without dumbing them down. If something cost me hours to figure out, I write it down so it costs you minutes.

Currently: researching, breaking, documenting.
Drawing diagrams nobody asked for.

Connect