Kusama: missed Paravalidation vote investigation
It finally happened. My first ever “incident” during Kusama paravalidation (missed vote). Let me explain what happened, how I noticed…
Kusama and Polkadot networks
If you’re into blockchain and cryptocurrencies, you’ve probably come across the names Kusama and Polkadot: they represent two of the…
Building the smallest elf program
In this post we will have fun trying to create the smallest possible 64 bits Linux program (ELF binary) that…
Javascript engine exploitation methodology
This post is actually a video. Here is my talk in French where I cover some exploitation methods of famous…
Vulnerability research and ActiveX controller exploitation
This post is technical and was written a long time ago. It covers vulnerability research topic and if you do…
How to learn and start in cybersecurity
Every person in this community was once a beginner and it’s usually a hard domain to begin with if you’re not…
Packing and dropping from resources
In this new series of articles “packing”, I will present to you various key technical points used by packers, starting…
Develop a kernel module in Linux
We have seen previously how to develop and integrate a system call into the Linux kernel. Now we are going…
Develop a system call in Linux
In this post we will we will see how to develop a system call by: Coding a function in C…