[email protected]:~$
CV & ResumeContact MePublic ServicesTags
  • Mar 13, 2023

    Stop saying eBPF when you mean cBPF.

    TL;DR: Let’s detect malware that uses BPF the right way. eBPF has become a hot topic, which leads to some hype whenever BPF is found in malware. The thing is, BPF malware is nothing new and most malware is using cBPF, not eBPF. Conflating cBPF with eBPF is harmful to defenders, who really need to understand the difference between the two when writing detections.

  • Jul 17, 2022

    Never Stop Reading: Crashing the HaikuOS Port of Cave Story

    TL;DR: Cave Story for HaikuOS go SEGV.

  • Apr 26, 2022

    whoami, who am I? Thoughts on protecting digital and human identities.

    TL;DR: What is identity security, why we often do it wrong, and how we can get it right.

  • Apr 1, 2022

    BeeSTrING: Critical Vulnerability in BPF Subsystem Allows Fully Unauthenticated RCE as Root

    TL;DR: Look at the publication date, I’m fucking with you.

  • Feb 22, 2022

    every Boring Problem Found in eBPF

    This article was originally written for tmp.0ut volume 2 and is available here: https://tmpout.sh/2/4.html. Due to the unique (read: badass) format of the zine, it is replicated here as plaintext.

1 2 3 4 5 Next »

[email protected]:~$

  • Friday Ortiz
  • [email protected]
  • FridayOrtiz
  • rafael-ortiz
  • Senicar
  • Senicar
  • FridayOrtiz

The new original cyber dog. Linux, crypto(graphy), Machine Learning.

<<< this site is part of the [haunted webring] >>>