Posts

A quick reference guide to GNU Debugger

Understanding wannacry and ransomwares

Getting hands dirty with embedded hardware CTF

Length extension attack and how it can be exploited

Essential Linux Commands