Sunny Mishra (codacker)



Sunny Mishra is a B.Sc. (Hons) Computer Science final year student with interests in cyber security and cloud infrastructure. He has been part of infosec community for more than 3 years. He likes to play CTF’s and create CTF challenges. He is one of the founding members of CTF team abs0lut3pwn4g3 and also core member of DC91120(Def Con Community Group).



  • Network Pentesting
  • Web Application Pentesting
  • Malware Analysis
  • Exploit Development
  • Cloud Infrastructure


  • B.Sc. Hons Computer Science, 2020

    College of Vocational Studies, University of Delhi







Exploit Development

Malware Analysis



Hacking and Patching

See certificate

Architecting with Google Compute Engine Specialization

See certificate

Kubernetes in the Google Cloud

See certificate

All 12 Active Badges

See certificate

Recent Posts

HTB Oouch Writeup

Oouch Writeup Starting the recon with a nmap scan to scan for ports and services running on them PORT STATE SERVICE REASON VERSION …

HTB Cascade Writeup

Cascade Writeup We start with a nmap scan on the ip to scan tcp ports and the services running on them. 1 2 3 4 5 6 7 8 9 10 11 12 13 …

ROP Emporium ret2win

Challenge info ret2win is the first challenge from rop emporium’s series of challenges of learning ROP. The objection of the …




A simple cli application to download pdf of research papers from sci-hub

Corona Stats

A basic cli to get live corona stats written in go

RTB CTF Framework

An framework written in python flask created to help organizing and managing Root the box style CTF’s

Train Enquiry System

A Desktop Application written in java using Swing UI, to get live status of trains in India using API provided by railwayapi.com

Xor Encryptor

A Basic file encryptor written using C++ with UI provided by QT framework

Recent Publications

Sig-return Oriented Programming

In this article I went through the technique of sig-return oriented programming which can be used to exploit buffer overflow attacks …

anti-RE for fun

In this article we went through a lot of different techniques that can be used to obfuscate a binary so that an attacker cannot easily …