Writing
All Articles
Thoughts, write-ups, and explorations in cyber security.
How Programs Really Run: A Simple Look Inside Software
A straightforward look at what happens between writing code and running a real program on your computer.
Read article →Why Ghidra Makes Binaries Easier to Understand
A practical look at how Ghidra helps turn confusing binaries into something you can actually follow and analyze.
Read article →What Reverse Engineers Look for First in a Binary
A deeper but still readable guide to the first clues analysts use when trying to understand unknown compiled programs.
Read article →Understanding SQL Injection: From Attack to Defence
A deep-dive into one of OWASP's most classic vulnerabilities — how it works, how to exploit it in a lab, and the proper way to fix it.
Read articleSetting Up a Home Lab for Penetration Testing
Step-by-step guide to building your first isolated pen-testing environment using VirtualBox, Kali Linux, and intentionally vulnerable VMs.
Read articleAES-256 Explained: Why Symmetric Encryption Matters
Breaking down how the world's most widely used cipher works — from key scheduling to modes of operation and why GCM is the go-to choice.
Read article