Windows Exploit Development (primer II) : Corrupting Structured Exception Handling and Controlling Memory Pointers Posted by Keith Makan May 20, 2018 Exploit Development Memory Corruption Reverse Engineering + Windows Exploit Development Exploit Development Memory Corruption Reverse Engineering Windows Exploit Development
Windows Exploit Development (primer) : Debugging Threads and Analyzing Memory Posted by Keith Makan May 16, 2018 Exploit Development Reverse Engineering WinDBG + Windows Exploit Development Exploit Development Reverse Engineering WinDBG Windows Exploit Development
Toward a critical phenomenology of closed source security Posted by Keith Makan May 04, 2018 Critical Theory Phenomenology Security + Software Critical Theory Phenomenology Security Software
Understanding Blockchain : The theory and the threats Posted by Keith Makan February 22, 2018 Altcoin Bitcoin Block Chain Blockchain Cryptocurrency Information Security Merkle-Trees + Security Testing Altcoin Bitcoin Block Chain Blockchain Cryptocurrency Information Security Merkle-Trees Security Testing
On Forced Open Sourcing of End of Life Software Posted by Keith Makan February 18, 2018 Computation Ethics Open Source Philosophy + Software Computation Ethics Open Source Philosophy Software
On the ontological duality of Software and Hardware II : and What it means for Open Source. Posted by Keith Makan February 17, 2018 Computation Critical Theory Ethics Hardware Open Source Philosophy Rights + Software Computation Critical Theory Ethics Hardware Open Source Philosophy Rights Software
[Android Security] Attacking the Android Package Manager from the past. Posted by Keith Makan February 15, 2018 Android Android Application Hacking +2 Android Secure Random vulnerability Android Security Threat Modelling Android Applications Android Android Application Hacking Android Secure Random vulnerability Android Security Threat Modelling Android Applications
(Philosophy) Egyptian Magic and Theory of Computation Posted by Keith Makan January 21, 2018 Computation Computer Science Egyptian Magic +1 Magic Mysticism Scroll of Ani Theory of Computation Computation Computer Science Egyptian Magic Magic Mysticism Scroll of Ani Theory of Computation