- Jan 12, 2018 FILE Structure Exploitation ('vtable' check bypass) - Understanding the recent check on 'vtable' and a possible bypass technique
- Feb 17, 2017 Attacking the OAuth Protocol - Analyzing the weaknesses of the OAuth 2.0 protocol
- Dec 25, 2016 SQL Attack (Constraint-based) - Demonstrating a constraint-based SQL Attack
- Aug 16, 2016 Elasticsearch Lua II - Google Summer of Code (GSoC) 2016 report
- Jul 3, 2016 Lua Version Manager - Introducing luaver. Ease your Lua, Luarocks, LuaJIT installation
- Dec 26, 2015 Shellcode Injection - Injecting shellcode by overflowing the buffer - Demonstration
- Oct 7, 2015 Elasticsearch Lua - Development of elasticsearch-lua, a client for elasticsearch written in Lua.
- Sep 8, 2015 DNS Security - Different types of attacks concerning DNS and their mitigation
- May 4, 2015 Combining chroot and xinetd - Running network services in a chroot jail
- Apr 3, 2015 Buffer Overflow Exploit - Exploiting the buffer overflow vulnerability
- Jun 12, 2014 Facebook spam spreads Trojan - Analysing the trojan and speculating on its functions
- May 23, 2014 Shifting to Ubuntu - My transition from Windows to Ubuntu