Salah Eddine Rahhali (@9x14S)
Cybersecurity Researcher | Reverse Engineer | Low-Level Developer
I am a Cybersecurity Researcher and Reverse Engineer focusing on low-level Linux and bare-metal programming. I am quite proficient in Binary Exploitation and Reverse Engineering from almost two years of doing more than 150 Capture The Flag competitions, where I've learned almost everything I know and where I decided to further pursue this domain.
This repository contains my personal projects, 42 School projects and projects from other courses or platforms.
Programming Languages
Reverse Engineering & Binary Exploitation
Infrastructure & Environment
: 42 School project where I made a stripped-down clone of Bash, implementing pipes, redirections, heredocs, environment variable interpolation and string manipulations.
: 42 School project where I made an HTTP server supporting CGI, multiple real-time connections through a single
pollsystem call, directory listing, file uploading, GET/POST/DELETE methods and significant HTTP/1.1 compliance.: Final 42 School project, finalizing my Common Core cursus. I made here a complete setup of a site health tracking program, using
dockeranddocker-composeto automate the deployment, created the full stack application using Next.js, implemented authorization using Email+Password or OAuth with Github and safe database interaction when presented with untrusted user input.
- ๐ Research: Gaining deeper experience reversing harder and more complex programs. Learning about breaking encryption algorithms and network protocols.
- ๐ฑ Exploring: Researching other architectures and operating systems such as iOS, Android, and the BSD family of OSes.
- โ๏ธ Mentorship: Teaching memory safety, secure coding practices, and systematically auditing C/C++/Python projects locally in the 42 Barcelona campus.
- Lisp9: Standards-compliant basic Lisp interpreter. I want to do this project to learn more about standards and their implementation.
- esolangs.py: Add more interpreters for esoteric languages to have most of them in a single easy-to-install package.
- pwn9: Personal Python library for Binary Exploitation classes and functions.
- pokeedit: CLI tool for editing Pokemon save files. The idea I had was to automate save file modification so I could explore different parts of the games.
- pokelectures: Automating Pokemon romhacking to use for lectures or as substitutes for ugly PowerPoint slides.
- OS9: My very own Operating System implementation, from scratch. No better way to learn what Terry Davis knew than try to do what he did.
- April 2026: Finished the 42 Cursus Common Core, transcended into the specialization "Outer Core", where I started doing the Cybersecurity, Maldev, Kernel and Cryptography branches. Finished in 6 months and 17 days out of the maximum duration of 2 years, breaking the local record by almost three months.
- September 2025: Joined the 42 Cursus Common Core. Here I've put to use my exploitation and reverse engineering skills to better understand other student's projects and provide the most rigorous program evaluations I could.
- July 2025: Joined the 42 Cursus Piscine, completing the 26-day test and achieving the highest score on all three measurable categories (Time Spent Programming, Projects Validated, Most Evaluations Done)
- October 2023: Start of my journey in the IT sector. Fueled only by curiosity. I jumped head-first into CTFs here.


