episeclab: hacking my way from worst to first

i joined epitech after ranking dead last at my previous school. found programming. got obsessed.

second year, first week: joined a CTF project. solved every level. then hacked the platform hosting it. then hacked the school’s systems. security clicked in a way nothing else had.

building the lab

connected with other students who caught the bug. pitched a security lab to the school. they said yes. episeclab was born.

five years of:

  • rewriting the security curriculum
  • creating CTF challenges
  • running R&D projects
  • hiring and mentoring TAs

by year two i was teaching. by the end, the school was paying me instead of the other way around.

what security teaches you

security isn’t following a checklist. it’s:

  • analysis: dig into systems, trace weird behaviors, follow breadcrumbs until you’re writing exploits
  • empathy: think like the developer who made the mistake
  • creativity: find the path nobody considered
  • architecture: see the big picture, imagine how things can go wrong

you learn to see systems from the attacker’s perspective. every design decision has security implications. every assumption is a potential exploit.

what i explored

  • cryptography: not just using it, but breaking it. timing attacks, padding oracles, implementation flaws
  • side-channel attacks: power analysis, cache timing, electromagnetic emissions
  • security design patterns: how to build systems that fail safely
  • low-level internals: memory corruption, stack smashing, ROP chains
  • reverse engineering: understanding binaries without source code

each challenge opened a new domain. each domain connected to others.

the best education is the one you build yourself.