Pinned0xCybersec_MattMicro Corruption — The Embedded Security CTFMicro Corruption’s CTF style challenges are great practice for learning the basics of binary exploitation. The main changeable panel…8 min read·Nov 14, 2021----
0xCybersec_MattSetting up a Velociraptor instanceBoth as part of my job (SOC analysts) and as a personal interest I often have to do DFIR type activities while investigating cases…6 min read·Apr 16, 2024----
0xCybersec_MattPractical Binary Analysis | Chapter 5 lvl2A Brief Background and Book Notes3 min read·Oct 18, 2021----