[ ESC ] > input detected: flag{... $ checking flag flag{n0_fl4g_h3r3_jus7_v1b3s} — press ESC or click outside to close
JIMANKY
ジマンキー

JIMANKY

CTF Player  ·  CERT Analyst  ·  2026

Scroll
Web Pwn Reverse Engineering Crypto OSINT Forensics Web Pwn Reverse Engineering Crypto OSINT Forensics
Web ✦ Pwn ✦ Reverse Engineering ✦ Crypto ✦ OSINT ✦ Forensics ✦ Web ✦ Pwn ✦ Reverse Engineering ✦ Crypto ✦ OSINT ✦ Forensics ✦ Web ✦ Pwn ✦ Reverse Engineering ✦ Crypto ✦ OSINT ✦ Forensics ✦
CTF ✦ Hacking ✦ Exploit ✦ Flag ✦ Writeup ✦ Shell ✦ RCE ✦ Privesc ✦ CTF ✦ Hacking ✦ Exploit ✦ Flag ✦ Writeup ✦ Shell ✦ RCE ✦ Privesc ✦ CTF ✦ Hacking ✦ Exploit ✦ Flag ✦ Writeup ✦

Part time
CTF player.
For fun.

Lorem ipsum or something i guess. Here's some random stats.

Top 700
Peak RootMe ranking
400+
Flags captured
Monster Energy consumption
LEARN
Never stop learning !

CTF
Highlights.

1st place Blue Team
Splunk BOTS 2026
BOTS is a blue-team capture the flag-esque competition. As a contestant, you will explore and investigate realistic event data in Splunk
1st place Forensic Rev
RootMe PRO - RootMe if you can 2022
Event organized by RootMe Pro and Airbus Defense and Space
Forensics OSINT
EC2 2023
European Cyber Cup - Part of INCYBER forum. 2nd place in both of Forensics anb OSINT categories
Challmaker Forensics Steganography OSINT PWN
ECW 2023 - EC2 2024
Challenge creation on forensics, steganography, OSINT and pwn subjects.

— Contact

Let's
play together
?

CTF team, collaboration, or just talking security — reach out.

hello@jimanky.com