Who's crying first?
Being around people costs something I can’t name and can’t recover from the same night. I’ve been sitting with this for years, trying to figure out whether the damage is mine, and I keep arriving s...
Being around people costs something I can’t name and can’t recover from the same night. I’ve been sitting with this for years, trying to figure out whether the damage is mine, and I keep arriving s...
It was 1 AM on a Tuesday and I had a wireless security project due in three weeks. I opened the 5G standard specification on my second monitor, the one with the dead pixel in the corner, and starte...
Assume two variables are correlated. which one causes the other? if you can run a controlled experiment, you answer that by forcing one variable to change and watching the other. but most of the ti...
Before you close this tab, hear me out. This is not a claim that AI does not work. GPT-4 exists. AlphaFold cracked the protein folding problem that stumped biologists for fifty years. Machine trans...
this series is about writing code that doesn’t get you or your company into a CVE report. not “sanitize your inputs lol.” but real life bugs and the exact tools that catch them. part 1 is memory sa...
Malware Classification Using Deep Learning Full runnable code (Google Colab): Open the notebook Introduction 1.1 The Problem Malware (malicious software) is software designed to damage sy...
Background: How the Lure Arrived A few hours ago my friend sent me a screenshot of a conversation with a random unknown number that is inviting him to a WhatsApp group and asking him to click a li...
Hikvision CVE-2021-36260: RCE to Persistent Access Introduction In this write-up, I document the technical exploitation of Hikvision’s unauthenticated RCE vulnerability CVE-2021-36260, affectin...