A tale of two operating systems, and a remotely exploitable heap corruption vulnerability
Aug 20, 2016
If you think about it, a remotely exploitable heap corruption vulnerability might just make for the best horror story that you could tell around a campfire. With this in mind, let's talk about QubesOS, and Subgraph.
So, a scientific data visualization tool, and a Minecraft world walk into a bar
Jul 18, 2015
What do you get when you cross a thin wrapper around VTK, a Minecraft world, and a sudden job interview?
Repurposing an old Android smartphone for penetration testing: the quitters guide
Jul 4, 2015
Is that a penetration testing tool in your pocket, or are you just happy to see me? This guide will help you set-up Arch Linux on your old Android smartphone, as well as a handful of your favourite penetration testing tools.
Adding a system call to the Linux kernel
Nov 9, 2014
System calls allow for user space programs to request kernel services. Let's write a system call together.
A gentle introduction to Berkeley Packet Filters
Aug 20, 2014
Berkeley/BSD packet filters can be used for stateless, protocol-agnostic network traffic filtering by examining the headers, and payload associated with packets in a given stream of network traffic.