I write detailed CTF write-ups, security analysis, and technical deep-dives.
You'll find write-ups covering memory forensics, network protocol analysis, ICS challenges, and reverse engineering. I also occasionally write about my projects, review books and papers, or share other musings.
Newest
View All- Book and Other Reviews - 2024
- LayerOne CTF - 2025
- Drop Dead Healthy - Book Review
- HouSecCon CTF - 2024
- LayerOne CTF - 2024
- Book and other reviews – 2023
- Book and other reviews – 2022
- 2022 Paper Group
- LayerOne 2021 CTF
- 2021 Paper Group
- Book and other reviews – 2021
- Simple Email Workflow to Avoid an Overflowing Inbox
Security & Technical
All Tags- LayerOne CTF - 2025
- HouSecCon CTF - 2024
- LayerOne CTF - 2024
- LayerOne 2021 CTF
- Hackvent 2019
- Graylog & Okta – Integration Walkthrough
- Introducing Neith
- LayerOne 2018 CTF – Web Category
- LayerOne 2018 CTF – Cyber Kill Chain Category
- LayerOne 2018 CTF – Blockchain Challenge Category
- Phish Yourself! – A practical guide to running an internal phishing campaign.
- Recon Part 4 – theHarvester and Recon-ng
Reviews & Other
View All- Book and Other Reviews - 2024
- Drop Dead Healthy - Book Review
- Book and other reviews – 2023
- Book and other reviews – 2022
- 2022 Paper Group
- 2021 Paper Group
- Book and other reviews – 2021
- Simple Email Workflow to Avoid an Overflowing Inbox
- Books and Review List – 2020
- Book and Review List – 2019
- Book and review list – 2018