Archive Show All32 8Bit Computer3 Assembly4 Buffer Overflows2 Bypass1 C7 CTF3 Computer Architecture5 Cybersecurity11 Cybersecurity Awareness1 DFIR2 EDR1 Exploitation3 FOSS3 Guide6 Hardware8 History2 Life5 Linux1 Low Level8 Malware Analysis2 Privacy3 Programming6 Reverse Engineering4 Tech17 Tech Facts5 Threat Detection2 Writeup5 2023 Sep 29Labelling: A Pandemic of Our Generation Aug 25Reverse Engineering 101: Dissecting Software Jul 28The Life of a Binary: From LoC to a PID Jun 30Shield Yourself: Five Tips to Strengthen your Online Security May 27PS/2 vs USB, FIGHT! Apr 09The 4043 - Part 3: Days 8 to 10, Well, how do they understand instructions? Apr 07The 4043 - Part 2: Days 5 to 7, But, how do they execute code? Apr 05The 4043 - Part 1: Days 1 to 4, How do Computers Work? Mar 28Utilising EDR Tests to Enhance Threat Detection Feb 28Formatting your Hard Drive isn't Enough Jan 08Tracking Changed My Life! 2022 Aug 17Sysmon EID 27 Bypass May 08There is No Single Roadmap 2021 Dec 07Variadic Functions & stdarg.h May 10Catch the IEX if You Can: PowerShell Deobfuscation 2020 Sep 13Reverse Engineering Writeup: ASCWG Finals 2020 Jul 04Who Moved My Cheese? Jun 26Buffer Overflows: PicoCTF2018-BufferOverflow-1 Feb 09IdeaPad 3XX (Realtek): Fixing the WiFi dropping on Linux 2019 Dec 04EG-CERT Writeup: EG-CTF Finals 2019 Dec 02The Art of Cybersecurity (And how to get into it) Oct 06Using MASM with the Irvine Library on GNU/Linux Sep 08CyberTalents Writeup: Egypt National Cyber Security CTF 2019 Jul 11Optimistic Nihilism Jun 29Acronyms May 22Buffer Overflows: The Basics May 16The C Boolean Data Type Apr 16What's Foss? Jan 06Ⅎacebook. 2018 Dec 17Storage Devices: A Smart Trick Dec 12The Unspoken Beauty of Open Source Dec 07Why we use the “QWERTY” keyboard layout