PinnedReducing the key space of an already broken cryptosystemThis post will examine a real world weak encryption scheme and show how by analyzing and refactoring the algorithm we can reduce the key…Mar 26, 2023Mar 26, 2023
Differential Cryptanalysis of FEAL implementationJust a short C++ implementation of an attack on the FEAL-4 block cipher outlined here: http://theamazingking.com/crypto-feal.phpApr 3Apr 3
Setting up a remote GPU machine learning environment and configuring an SSH tunnel for easy accessSetting up a GPU accelerated cloud instance for machine learning and tunneling into it as if it was running locallyMar 28Mar 28
Deploying a self hosted GitLab behind a reverse proxy with basic URL authenticationHosting your own GitLab server behind an NginX reverse proxy with basic URL authenticationJan 28Jan 28
Write-up of the first few pwnable challengesWrite-up of the challenges at https://pwnable.krMay 22, 2023May 22, 2023
Binary classification with uncertain dataSome thoughts on tackling binary classification problems where the ground truth labels are not clear cut.Mar 26, 2023Mar 26, 2023
Bart Detection: A quick exercise in signal classification using XGBoostTraining a simple XGBoost classifier to detect the Bart pattern in bitcoin market data.Jan 6, 2023Jan 6, 2023
Manually unpacking a UPX packed binary with radare2 (Part_2)How to dump the unpacked program from memory and reconstruct a valid ELFMay 9, 20211May 9, 20211
Manually unpacking a UPX packed binary with radare2 (Part_1)Manually unpacking a UPX packed 64 bit elf with radare2 on LinuxMay 7, 2021May 7, 2021