[email protected]:~$
CV & ResumeContact MePublic ServicesTags
  • Sep 16, 2024

    Replicating an eBPF SDIV Oops

    TL;DR: Signed division is hard and sometimes it makes the kernel sad.

  • Sep 5, 2024

    Vulnerable eBPF CTF Challenge 01

    A CTF style vulnerable box where you need to find and exploit a mistake in an eBPF program that allows privilege escalation to root.

  • May 5, 2023

    Interactivity is the halting problem in a trench coat.

    Or: please, please, stop piping curl into bash in prod.

  • Mar 13, 2023

    Stop saying eBPF when you mean cBPF.

    TL;DR: Let’s detect malware that uses BPF the right way. eBPF has become a hot topic, which leads to some hype whenever BPF is found in malware. The thing is, BPF malware is nothing new and most malware is using cBPF, not eBPF. Conflating cBPF with eBPF is harmful to defenders, who really need to understand the difference between the two when writing detections.

  • Jul 17, 2022

    Never Stop Reading: Crashing the HaikuOS Port of Cave Story

    TL;DR: Cave Story for HaikuOS go SEGV.

1 2 3 4 5 Next »

[email protected]:~$

  • Friday Ortiz
  • [email protected]
  • FridayOrtiz
  • rafael-ortiz
  • Senicar
  • Senicar
  • FridayOrtiz

The new original cyber dog. Linux, crypto(graphy), Machine Learning.

<<< this site is part of the [haunted webring] >>>