Sep 18, 2025 · 7 min read · What Initially Drew Me to Security Research? Cybersecurity is a huge field.. So many directions to go.. but I'll always follow my heart.. And I've always loved learning about the low-level stuff in computing.. my heart always goes to the fundamentals...
Join discussion
Sep 15, 2025 · 4 min read · Installing the Target Kernel Grab the kernel source code and headers from github and the apt package manager # update the packages sudo apt update # Install the following packages so that all essential components for kernel sudo apt install -y \ lin...
Join discussion
May 12, 2025 · 5 min read · Have you ever wondered what happens under the hood when you type a URL and hit enter? What if you could write a web server from scratch — not in C or Python, but in pure x86_64 Assembly, using only Linux system calls? That’s exactly what I did. This ...
Join discussion
Apr 10, 2025 · 5 min read · A bit of background on buffer overflows: Buffer overflows occur when a program writes more data to a buffer than it can hold. This can overwrite nearby memory, potentially allowing attackers to execute arbitrary code or cause other security issues. ...
Join discussionFeb 4, 2025 · 4 min read · Bug bounty hunting is one of the most rewarding skills in cybersecurity. Ethical hackers can discover vulnerabilities, enhance security, and earn significant rewards. This guide will provide a deep dive into finding, exploiting, and reporting vulnera...
Join discussion
Oct 9, 2023 · 4 min read · In the ever-evolving landscape of cybersecurity, one term that often sends shivers down the spines of both security professionals and the general public is "zero-day exploit." These clandestine attacks are considered some of the most potent and dange...
Join discussion