Skip to content
View 9x14S's full-sized avatar

Block or report 9x14S

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please donโ€™t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
9x14S/README.md

Salah Eddine Rahhali (@9x14S)

Cybersecurity Researcher | Reverse Engineer | Low-Level Developer

I am a Cybersecurity Researcher and Reverse Engineer focusing on low-level Linux and bare-metal programming. I am quite proficient in Binary Exploitation and Reverse Engineering from almost two years of doing more than 150 Capture The Flag competitions, where I've learned almost everything I know and where I decided to further pursue this domain.

This repository contains my personal projects, 42 School projects and projects from other courses or platforms.

Core Skills

Programming Languages

C Python Rust Assembly Shell Scripting

Reverse Engineering & Binary Exploitation

Ghidra Radare2 pwndbg IDA

Infrastructure & Environment

Linux Docker QEMU/KVM

Finished Projects

  • minishell: 42 School project where I made a stripped-down clone of Bash, implementing pipes, redirections, heredocs, environment variable interpolation and string manipulations.
  • Webserv: 42 School project where I made an HTTP server supporting CGI, multiple real-time connections through a single poll system call, directory listing, file uploading, GET/POST/DELETE methods and significant HTTP/1.1 compliance.
  • Transcendence: Final 42 School project, finalizing my Common Core cursus. I made here a complete setup of a site health tracking program, using docker and docker-compose to automate the deployment, created the full stack application using Next.js, implemented authorization using Email+Password or OAuth with Github and safe database interaction when presented with untrusted user input.

Current Focus

  • ๐Ÿ” Research: Gaining deeper experience reversing harder and more complex programs. Learning about breaking encryption algorithms and network protocols.
  • ๐Ÿ“ฑ Exploring: Researching other architectures and operating systems such as iOS, Android, and the BSD family of OSes.
  • โš”๏ธ Mentorship: Teaching memory safety, secure coding practices, and systematically auditing C/C++/Python projects locally in the 42 Barcelona campus.

Future Projects

  • Lisp9: Standards-compliant basic Lisp interpreter. I want to do this project to learn more about standards and their implementation.
  • esolangs.py: Add more interpreters for esoteric languages to have most of them in a single easy-to-install package.
  • pwn9: Personal Python library for Binary Exploitation classes and functions.
  • pokeedit: CLI tool for editing Pokemon save files. The idea I had was to automate save file modification so I could explore different parts of the games.
  • pokelectures: Automating Pokemon romhacking to use for lectures or as substitutes for ugly PowerPoint slides.
  • OS9: My very own Operating System implementation, from scratch. No better way to learn what Terry Davis knew than try to do what he did.

๐Ÿ† Milestones & Achievements

  • April 2026: Finished the 42 Cursus Common Core, transcended into the specialization "Outer Core", where I started doing the Cybersecurity, Maldev, Kernel and Cryptography branches. Finished in 6 months and 17 days out of the maximum duration of 2 years, breaking the local record by almost three months.
  • September 2025: Joined the 42 Cursus Common Core. Here I've put to use my exploitation and reverse engineering skills to better understand other student's projects and provide the most rigorous program evaluations I could.
  • July 2025: Joined the 42 Cursus Piscine, completing the 26-day test and achieving the highest score on all three measurable categories (Time Spent Programming, Projects Validated, Most Evaluations Done)
  • October 2023: Start of my journey in the IT sector. Fueled only by curiosity. I jumped head-first into CTFs here.

๐Ÿ“Š GitHub Stats

9x14S GitHub Stats

Pinned Loading

  1. 42-Cursus-minishell 42-Cursus-minishell Public

    Minishell implementation for 42

    C

  2. 42-Cursus-Inception 42-Cursus-Inception Public

    Docker containerization and setup project for 42

    Dockerfile

  3. acfc acfc Public

    auto-cpufreq C rewrite

    C

  4. Exploits Exploits Public

    Collection of miscellaneous exploit scripts and solutions for CTF challenges I've participated in

    HTML

  5. osdev-barebones-kernel osdev-barebones-kernel Public

    Small testing bare-metal kernel made in C and x86 Assembly

    C

  6. 42-Cursus-Cub3d 42-Cursus-Cub3d Public

    3D Raycasting game project for 42

    C