A tale of two operating systems, and a remotely exploitable heap corruption vulnerability

Aug 20, 2016
If you think about it, a remotely exploitable heap corruption vulnerability might just make for the best horror story that you could tell around a campfire. With this in mind, let's talk about QubesOS, and Subgraph.

So, a scientific data visualization tool, and a Minecraft world walk into a bar

Jul 18, 2015
What do you get when you cross a thin wrapper around VTK, a Minecraft world, and a sudden job interview?

Repurposing an old Android smartphone for penetration testing: the quitters guide

Jul 4, 2015
Is that a penetration testing tool in your pocket, or are you just happy to see me? This guide will help you set-up Arch Linux on your old Android smartphone, as well as a handful of your favourite penetration testing tools.

Adding a system call to the Linux kernel

Nov 9, 2014
System calls allow for user space programs to request kernel services. Let's write a system call together.

A gentle introduction to Berkeley Packet Filters

Aug 20, 2014
Berkeley/BSD packet filters can be used for stateless, protocol-agnostic network traffic filtering by examining the headers, and payload associated with packets in a given stream of network traffic.