These are just some signs I though were funny when I saw them. Family members feel free to email me others if you would like them to be included.
Most Recent Articles
This is a writeup of the format string vulnerability in level 4 of the 64bitprimer VM from vulnhu
Installation of the software to make a yubikey 4 work in FIDO U2F mode on Debian Jessie i386
This one stumped me. Overall, it was a great competition for me as I got to learn a whole lot of new things. I had never worked on a Mac, other than as a user, had never used Hopper, lldb or any of the other tools for reversing on a Mac, and haven't got any experience in the Objective C/Swift framework.
Explains the workings of a DMZ, walks through setting up and testing of a DMZ in a virtual machine lab environment
In this video I go through the process of setting up an SSH tunnel to hide an IP and also setting
Useful for someone who is interested in what a buffer overflow is. Does not go into the details of development, just explains generally and demonstrates the use of one.
a demonstration of a vulnerability discovered and published by Muts in 2004, exploited on a Windows XP SP3 machine using Python, Immunity Debugger, and Metasploit.