Hi — I’m Lance Kenji Parce (aka mis4nthr0pia). I’m a Computer Science student from Philippines who builds web apps, hunts bugs, and writes about security. I’m part of team Lil:Pwny, and I enjoy solving CTF challenges that teach me something new about exploitation and defensive design.
What I do / What you’ll find here
I treat this site as a personal lab notebook and blog. Expect a mix of:
- CTF writeups and walkthroughs (how I approached problems, exploitation steps, and lessons learned)
- Practical web security posts (OWASP-style testing, PHP/web app gotchas)
- Development experiments and small projects I build to learn or automate tasks
- Short, opinionated pieces about tooling, workflows, and bug bounty strategies
How I work / My approach
I combine a developer’s mindset with offensive testing: I like to understand how systems were built so I can find where they break. My writeups aim to be hands-on and reproducible — enough context to learn from, but concise so you can follow the important bits without fluff. I prefer showing the process (commands, scripts, or screenshots) over just the final answer.
Technical background
I lean on a dev + security toolkit:
- Languages: PHP, Python, JavaScript
- Frameworks & patterns: Django, MVC-style architectures
- Tools & practices: Linux, scripting & automation, basic pentesting workflows, CTF toolchains
This combo helps me reason about vulnerabilities from both the developer and attacker perspectives.
This site / Docs
This site is my public knowledge base — a space to share CTF writeups, personal development projects, technical experiments, and insights about cybersecurity, CVEs, and web development. It’s meant to be useful for anyone interested in practical, example-driven security research, coding experiments, and tech reflections.
Reach me / Follow my content
- Telegram: http://t.me/lance_aswwscxzc/
- LinkedIn: https://www.linkedin.com/in/lancekenjiparce/
- TikTok: http://tiktok.com/@mis4nthrop1a
- YouTube: https://www.youtube.com/channel/UCKvOtwc-rIWJna4B17CsG9A