Pinned0xCybersec_MattMicro Corruption — The Embedded Security CTFMicro Corruption’s CTF style challenges are great practice for learning the basics of binary exploitation. The main changeable panel…Nov 14, 2021Nov 14, 2021
0xCybersec_MattSetting up a Velociraptor instanceBoth as part of my job (SOC analysts) and as a personal interest I often have to do DFIR type activities while investigating cases…Apr 16Apr 16
0xCybersec_MattPractical Binary Analysis | Chapter 5 lvl2A Brief Background and Book NotesOct 18, 2021Oct 18, 2021