whoami

  • Alan Li ≡ alanlitw ≡ lebr0nli ≡ a nobody

pwd

  • /Users/NYCU

ls ~/favorites

  • web/
  • pwn/
  • breaking\ sandbox/
  • CTF/
  • Bug\ Bounty/
  • programming/
  • rock’n’roll/

Work Experience

  • Researcher Intern @ DEVCORE
    • Find and report 0-day vulnerabilities in various applications (mostly web applications)
    • September 2023 - July 2024

Vulnerability Reports

Company / Product Vulnerability Type Time
QNAP - Video Station OS Command Injection (CVE-2023-47563) 2024.09
QNAP - QuFirewall Path Traversal (CVE-2023-41290, CVE-2023-41291) 2024.04
QNAP - Photo Station OS Command Injection (CVE-2023-47562) 2024.02
QNAP - Photo Station Cross-site Scripting (CVE-2023-47561) 2024.02
QNAP - QuMagie OS Command Injection (CVE-2023-47560) 2024.01
QNAP - QuMagie Cross-site Scripting (CVE-2023-47559) 2024.01
QNAP - QcalAgent OS Command Injection (CVE-2023-41289) 2024.01
Quizlet REDACTED (Priority 2 on Bugcrowd) 2022.02
Dcard Insecure Direct Object References 2021.11
Quizlet REDACTED (Priority 3 on Bugcrowd) 2021.09
Quizlet REDACTED (Priority 3 on Bugcrowd) 2021.08
Dcard Open Redirect 2021.07
Dcard Open Redirect 2020.09
Dcard Insecure Direct Object References 2020.08
Dcard Insecure Direct Object References 2020.08

CTF (Capture the Flag)

Name Participated as Rank Time Location
Asian Cyber Security Challenge lebr0nli (individual) 12th (Taiwan 2nd) 2024.04 remote
AIS3 EOF Final YAATN ain’t a team name (team) 1st 2024.02 New Taipei, TW
AIS3 EOF Quals lebr0nli (individual) 2nd 2024.01 remote
HITCON CTF Final Blue Water (team) 9th 2023.11 Taipei, TW
Balsn CTF ${CyStick} (team) 3rd 2023.11 remote
SECCON CTF Quals ${CyStick} (team) 2nd 2023.09 remote
HITCON CTF Quals Blue Water (team) 1st 2023.09 remote
Asian Cyber Security Challenge lebr0nli (individual) 35th (Taiwan 6th) 2023.02 remote
HITCON CTF Water Paddler (team) 11th 2022.11 remote
Google Capture The Flag Final Stage (Hackceler8) Water Paddler (team) Group B 3rd 2022.09 London, UK
Google Capture The Flag Qualification Water Paddler (team) 5th 2022.07 remote
ångstromCTF Water Paddler (team) 3rd 2022.05 remote
Asian Cyber Security Challenge lebr0nli (individual) 56th (Taiwan 6th) 2021.09 remote
AIS3 Pre-Exam e^iπ+1day (individual) 6th 2021.05 remote

I participated in more than 50+ CTFs on CTFtime.org since early 2021 with my one-man CTF team, e^iπ+1day

From May 2022, I joined Water Paddler.

From August 2023, I also joined ${CyStick}.

I usually post my write-ups on this blog, but sometimes I’m too lazy to write them down so I just post my solve scripts on my GitHub Gist :p

Side Project

  • GEP (GDB Enhanced Prompt)
    • Enhance your GDB with fzf history search, fish-like autosuggestions, tab auto-completion with fzf, and more!
    • Python
    • GDB plug-in
  • PHPFun
    • PHP obfuscator
    • Python CLI
    • Simple Web Interface with Brython
    • CTF tool

Open Source Contribution

  • pwndbg
    • Exploit Development and Reverse Engineering with GDB Made Easy
    • Python
    • My commits
  • one_gadget
    • The best tool for finding one gadget RCE in libc.so.6
    • Ruby
    • My commits
  • Hackbar
    • A browser extension for Penetration Testing
    • Javascript
    • My commits