In particular, operating

systems are a huge source of vulnerabilities nowadays.. 

Currently on-going courses!

Follow more on my Twitter page


Security Blog

A wise man once said, give a man a fish, and you feed him for a day. Teach a man to fish, and you feed him for a life time. New Updates is essential to my new Security Blog.

Github - Recent coding

You can follow my currenct projects on GitHub. This is where I post all from Java to C# and all other relevant code that I want to share with the world.

Standford University

Cryptography Course Completed! - Awaiting certification by Dan Boneh

Currently & Recently readings

Please visit my Security blog for more details.




Some of my favorite moments

Analysing 3rd party shellcode with Libemu
Exploiting Memcpy() within a simple TCP echo server on WinXP SP3:
- Meterpreter shell style
Using Railgun within Meterpreter to invoke a syscall that locks the client workstation
Exploitation from AoE - Web Server:
I was calculating about how large my NOP sled should be and allign the 78-byte shellcode, since the buffer was 500 bytes I knew that I had a chance to get control over the program execution - and thereby exploited the web server!
How System Calls work:
I learn stuff by drawing them down on my whiteboard.
Exploitation of FreeSSHd - example
Adding debugging content to exsisting programs and Stripping it afterwards