Archive Show All36 8Bit Computer3 Assembly4 Buffer Overflows2 Bypass1 C9 CTF3 Career3 Computer Architecture5 Cybersecurity11 Cybersecurity Awareness1 DFIR2 EDR1 Exploitation3 FOSS3 Guide7 Hardware10 History2 Life6 Linux2 Low Level10 Malware Analysis2 Privacy3 Programming8 Reverse Engineering5 Tech20 Tech Facts5 Threat Detection2 Writeup5 2024 Aug 27Milk, I2C, and SMBus 2023 Dec 07Technoir: Reflecting on Five Years Nov 30Decoding Circuits: Hardware Reverse Engineering Oct 27Back to Basics: Why do we return 0? Sep 29Labelling: A Pandemic of Our Generation Aug 25Reverse Engineering 101: Dissecting Software Jul 28The Life of a Binary: From LoC to a PID Jun 30Shield Yourself: Five Tips to Strengthen your Online Security May 27PS/2 vs USB, FIGHT! Apr 09The 4043 - Part 3: Days 8 to 10, Well, how do they understand instructions? Apr 07The 4043 - Part 2: Days 5 to 7, But, how do they execute code? Apr 05The 4043 - Part 1: Days 1 to 4, How do Computers Work? Mar 28Utilising EDR Tests to Enhance Threat Detection Feb 28Formatting your Hard Drive isn't Enough Jan 08Tracking Changed My Life! 2022 Aug 17Sysmon EID 27 Bypass May 08There is No Single Roadmap 2021 Dec 07Variadic Functions & stdarg.h May 10Catch the IEX if You Can: PowerShell Deobfuscation 2020 Sep 13Reverse Engineering Writeup: ASCWG Finals 2020 Jul 04Who Moved My Cheese? Jun 26Buffer Overflows: PicoCTF2018-BufferOverflow-1 Feb 09IdeaPad 3XX (Realtek): Fixing the WiFi dropping on Linux 2019 Dec 04EG-CERT Writeup: EG-CTF Finals 2019 Dec 02The Art of Cybersecurity (And how to get into it) Oct 06Using MASM with the Irvine Library on GNU/Linux Sep 08CyberTalents Writeup: Egypt National Cyber Security CTF 2019 Jul 11Optimistic Nihilism Jun 29Acronyms May 22Buffer Overflows: The Basics May 16The C Boolean Data Type Apr 16What's Foss? Jan 06Ⅎacebook. 2018 Dec 17Storage Devices: A Smart Trick Dec 12The Unspoken Beauty of Open Source Dec 07Why we use the “QWERTY” keyboard layout