Windows Exploit Development (primer II) : Corrupting Structured Exception Handling and Controlling Memory Pointers Posted by Keith Makan May 20, 2018 Exploit Development Memory Corruption Reverse Engineering Windows Exploit Development +
Windows Exploit Development (primer) : Debugging Threads and Analyzing Memory Posted by Keith Makan May 16, 2018 Exploit Development Reverse Engineering WinDBG Windows Exploit Development +
Toward a critical phenomenology of closed source security Posted by Keith Makan May 04, 2018 Critical Theory Phenomenology Security Software +
Understanding Blockchain : The theory and the threats Posted by Keith Makan February 22, 2018 Altcoin Bitcoin Block Chain Blockchain Cryptocurrency Information Security Merkle-Trees Security Testing +
On Forced Open Sourcing of End of Life Software Posted by Keith Makan February 18, 2018 Computation Ethics Open Source Philosophy Software +
On the ontological duality of Software and Hardware II : and What it means for Open Source. Posted by Keith Makan February 17, 2018 Computation Critical Theory Ethics Hardware Open Source Philosophy Rights Software +
[Android Security] Attacking the Android Package Manager from the past. Posted by Keith Makan February 15, 2018 Android Android Application Hacking Android Secure Random vulnerability Android Security Threat Modelling Android Applications +
(Philosophy) Egyptian Magic and Theory of Computation Posted by Keith Makan January 21, 2018 Computation Computer Science Egyptian Magic Magic Mysticism Scroll of Ani Theory of Computation +