A tale of two operating systems, and a remotely exploitable heap corruption vulnerability

Aug 20, 2016
If you think about it, a remotely exploitable heap corruption vulnerability might just make for the best horror story that you could tell around a campfire. With this in mind, let's talk about QubesOS, and Subgraph.

Linguists hate him! How to build your very own statistical language classifier in 30 minutes or less!

May 4, 2016
Linguists hate him! How to build a naïve language guessing oracle at home using nothing more than Python, a cup of tea, and a few corpora from the Leipzig Corpora Collection. See inside for details.

Subverting 512-bit RSA using RSA-BDH: an RSA backdoor based on the Decisional Diffie-Hellman (DDH) assumption

Mar 13, 2016
RSA-BDH is an asymmetric backdoor for RSA based on the Decisional Diffie-Hellman (DDH) assumption and is suitable for compromising short RSA keys in black-box environments.

Security Shield: protect your pc in new level (analysing a variant of Win32/Winwebsec)

Mar 3, 2016
Malware strains in this family tend to masquerade as legitimate software in order to gain the trust of users, and may take advantage of this relationship for financial gain.

So, a scientific data visualization tool, and a Minecraft world walk into a bar

Jul 18, 2015
What do you get when you cross a thin wrapper around VTK, a Minecraft world, and a sudden job interview?

Repurposing an old Android smartphone for penetration testing: the quitters guide

Jul 4, 2015
Is that a penetration testing tool in your pocket, or are you just happy to see me? This guide will help you set-up Arch Linux on your old Android smartphone, as well as a handful of your favourite penetration testing tools.

Adding a system call to the Linux kernel

Nov 9, 2014
System calls allow for user space programs to request kernel services. Let's write a system call together.

A gentle introduction to Berkeley Packet Filters

Aug 20, 2014
Berkeley/BSD packet filters can be used for stateless, protocol-agnostic network traffic filtering by examining the headers, and payload associated with packets in a given stream of network traffic.