Posts

Understanding wannacry and ransomwares

Getting hands dirty with embedded hardware CTF

Length extension attack and how it can be exploited

Essential Linux Commands