Posts
The Attackers Dilemma
This blog is still alive
LoRaHam: data over amateur 70cm bands
Security is remarkably unevenly distributed
Language Agnostic Security Code Review
Notes on the current security of PyPI/pip
Pentest Skills To Land a Job in 2019
WebApp Testing With AutoRepeater
Mongoose Heap Overflow
Attacking Merkle Trees With a Second Preimage Attack
Barriers to sucessful IoT bug bounites
How and Why you should disable internationalized domains
teardown: e-mods rs-1 handheld
Defcon CTF 2016 Quals: xkcd
rhme3 exploitation writeup
AVR Glitch: Modifying Code Execution Paths Using Only Voltage