Heap Grooming for Dummies: A Modern Glibc Exploitation Primer
A deep dive into tcache poisoning, safe-linking bypass, and constructing reliable primitives against modern glibc 2.38. Includes fully weaponized PoC.
█
Systems developer and security researcher who builds things that don't break — and breaks things that weren't built well enough. Specializing in low-level systems, adversarial research, and infrastructure that scales.
arif@dev:~$ whoami
Arif Chowdhury — Systems Developer, Security Researcher
arif@dev:~$ cat skills.txt
Languages: Python, Java, C, C++, Rust, JavaScript
Security: Pentesting, Exploit Dev, Reverse Engineering, CTF
Tooling: GDB, Ghidra, Burp Suite, Wireshark, Metasploit, Docker, Linux
arif@dev:~$ ls certifications/
CEH OSCP-in-progress CTF-winner-2024 HackTheBox-Pro
arif@dev:~$ █
FastKV is a pure-Python, high-performance key-value database designed for durability, speed, and simplicity. It implements a log-structured merge-tree (LSM-tree) architecture similar to RocksDB/LevelDB, optimized for SSD storage with asynchronous compaction, bloom filters, and configurable durability modes.
A real-time, browser-based Linux terminal powered by Node.js, WebSockets, xterm.js, and a secure Python CLI client. Built for remote access, development, learning, demos, and debugging.
Python-based automated vulnerability scanner with CVE correlation, service fingerprinting, and custom exploit templates. Integrates with Shodan and NVD.
Custom memory allocator in C with slab allocation, memory poisoning, and built-in heap corruption detection. Drop-in replacement for glibc malloc.
Real-time network monitoring dashboard in JavaScript/Node.js with packet analysis, anomaly detection ML pipeline, and threat intelligence feeds.
I'm Arif Chowdhury, a systems developer and security researcher based in Dhaka. I write code in eight languages and break things in all of them.
My work lives at the intersection of low-level systems programming and adversarial security research — building the tools that defenders need and understanding the mindset that attackers use.
When I'm not hunting bugs or optimizing allocators, I write about systems internals, binary exploitation, and the philosophy of building resilient software. Security isn't a feature — it's a property.
{
"handle": "arif_0x41",
"rank": "Pro Hacker",
"owns": { "user": 67, "root": 54 },
"ctf_wins": ["BUET CTF 2024", "CyberDhaka 2023"],
"karma": 4820
}
A deep dive into tcache poisoning, safe-linking bypass, and constructing reliable primitives against modern glibc 2.38. Includes fully weaponized PoC.
Walkthrough of building MemVault — from sbrk() to slab caches to thread-local free lists. Benchmarking methodology and surprising results against jemalloc.
Migrating PhantomShell from C to Rust: ownership as a security primitive, safe FFI patterns, and how the borrow checker caught three memory bugs I'd been living with for months.
Static and dynamic analysis of a LockBit-variant collected in the wild. Unpacking, string deobfuscation, and reconstruction of the encryption key schedule.
Using eBPF for kernel-level packet observation and feeding live features into an isolation forest model. Real-time threat detection without userspace overhead.
OPEN TO COLLABORATIONS, RED TEAM WORK, AND INTERESTING PROBLEMS
admin@arifdev.qzz.io