Industrial Security.
Industrial Security.
Offensive Security & Explotation
Exploitation.
Exploitation.
Windows & Linux Kernel
Practical Pentesting
Practical Pentesting
Real world cybersecurity attack.
Tool Development
Tool Development
Design and develop own tool.
Shellcode.
Shellcode.
Write a shellcode step by step with NASM.
Reverse Engineering
Reverse Engineering
Reversing, debugging and protecting a software with cryptography.
[Learning] OpenBootloader: Understanding Boot Process and Bootloaders

[Learning] OpenBootloader: Understanding Boot Process and Bootloaders

READ MORE +
[Book] The Shellcoder Handbook 2nd Edition

[Book] The Shellcoder Handbook 2nd Edition

READ MORE +
[Tools] Rust Implementation of CVE-2026-31431

[Tools] Rust Implementation of CVE-2026-31431

READ MORE +
[Book] Rootkit And Bootkit

[Book] Rootkit And Bootkit

READ MORE +
[Book] PC Assembly Language

[Book] PC Assembly Language

READ MORE +
[Series] RootkitBootkit — A New Series For Studying Rootkits & Bootkits

[Series] RootkitBootkit — A New Series For Studying Rootkits & Bootkits


“cause I’m a gambling boogie man although I don’t play fair” — Oogie Boogie

READ MORE +
[Series] From Bug To Exploit — A New Series For Studying Critical Vulnerabilities

[Series] From Bug To Exploit — A New Series For Studying Critical Vulnerabilities


“A bug is never just a mistake. It represents something bigger. An error of thinking that makes you who you are” — Mr. Robot

READ MORE +
[Studying] Analyzing NotPetya

[Studying] Analyzing NotPetya


NotPetya: Beyond ransomware — worming and destruction

READ MORE +
[Studying] Analyzing Petya

[Studying] Analyzing Petya

READ MORE +
[Learning] Simple MBR And Bootloader: Something Before Analyzing Petya

[Learning] Simple MBR And Bootloader: Something Before Analyzing Petya

READ MORE +