19 Mar 2018 - Troopers18 - Exploitation on ARM-based Systems
15 Nov 2017 - BlueFrostSecurity Ekoparty Exploitation Challenge
17 Dec 2016 - Semantic Search Implementation in Ropper
15 May 2016 - Analysis of a Heap Overflow in Foxit Reader
27 Mar 2016 - Set up a Global Descriptor Table in Unicorn-Engine
23 Mar 2016 - FileBytes - How to edit files
03 Mar 2016 - FileBytes - Introduction
23 Mar 2014 - backdoorCTF 2014 WriteUp - web250
23 Mar 2014 - backdoorCTF 2014 WriteUp - web200
23 Mar 2014 - backdoorCTF 2014 WriteUp - misc250
23 Mar 2014 - backdoorCTF 2014 WriteUp - crypto200
17 Jun 2013 - DEF CON CTF 2013 WriteUp - 3dub 1
05 May 2013 - VolgaCTF 2013 WriteUp - stegasic 500
03 May 2013 - VolgaCTF 2013 WriteUp - exploit 100
22 Apr 2013 - PlaidCTF 2013 WriteUp - cyrpto
23 Mar 2013 - ForbiddenBITS CTF 2013 WriteUp - poir
19 Mar 2013 - ForbiddenBITS CTF 2013 WriteUp - smelf