Blog
-

Miles for Mac Security: Supporting FOSS and Aspiring Hackers
Miles for Mac Security: Fundraiser to support free and open source software (FOSS) and aspiring hackers.
-

Minimum Spanning Trees (MSTs) via Kruskal and Prim
MSTs are the smallest connected subgraph that spans all the vertices of a given graph, minimizing the total edge weights.
-

ASLR, bypass techniques, and circumvention impacts
Address space layout randomization (ASLR) randomizes memory addresses used by system and application processes.
-

Rethinking Breakfast: How Our Mornings Became Dessert Time
Breakfast: How did syrup-drenched pancakes, sugary cereals, and icing-laden pastries become the standard way to start the day in my country?
-

Compilation Phases Explained – Analysis and Synthesis
Compilers work in phases to translate source code into machine code or an intermediate representation.
-

How to use ROP to bypass security mechanisms
Learn how to bypass and circumvent W^X, ASLR, and stack canaries using return-oriented programming (ROP) by controlling execution flow!
-

Graph Algorithm Basics, BFS, and DFS
Graph: Graphs provide representations of relationships between entities, helping analyze and identify patterns in data. Learn more here!
-

How OS affects binary exploitation
This blog explores how foundational OS topics like System V, POSIX, UNIX, and BSD influence binary exploitation on macOS and Linux.
-

ACE Chapter 2: The Integrated Fitness Training Model
Notes for chapter 2 of the ACE Certified Personal Trainer (CPT) exam. The focus of this chapter is the Integrated Fitness Training Model.