Published inInfoSec Write-upsPhoenix Challenges — Stack Five (Custom Shellcode)This blog post is a bit different. Instead of a new challenge, it is an extension of the previous Phoenix Stack Five writeup. Those…May 20, 2023May 20, 2023
Published inInfoSec Write-upsPhoenix Challenges — Stack Five (Pwntools Shellcode)Phoenix Challenges — Stack Five (Pwntools Shellcode)May 15, 2023May 15, 2023
Published inInfoSec Write-upsPhoenix Challenges — Stack ZeroAn explanation of Exploit Education’s Phoenix “Stack Zero” hacking challenge and the involved solutionsAug 7, 2022Aug 7, 2022
Phoenix Challenges — Getting Set UpThis is the first of a series of writeups for the Phoenix challenges and explains how those wanting to follow along can get set up.May 16, 2022May 16, 2022
Learning to Code For InfosecA commonly-repeated mantra for current and future practitioners at InfoSec conference talks, blog posts, and Twitter threads is that one…May 15, 2022May 15, 2022
Why Programmers Should Learn Embedded SystemsAn explanation of why every computer science student and software engineer would benefit from learning embedded systems.Jan 23, 2021Jan 23, 2021