I write detailed CTF write-ups, security analysis, and technical deep-dives.
You'll find write-ups covering memory forensics, network protocol analysis, ICS challenges, and reverse engineering. I also occasionally write about my projects, review books and papers, or share other musings.