[email protected]:~$
CV & ResumeContact MePublic ServicesTags
  • May 8, 2026

    Who turned all this shit on? A Kernel Hardening Guide

    tl;dr: I asked the nice robot to help me build a repo that categorizes kernel config options by risk and legitimate users, creating a hardening guide for things you should probably just disable.

  • Oct 2, 2025

    Introducing 0xB33SM0K3R: The Ultimate eBPF Bypass Technique

    TL;DR: Your eBPF tools are safe. This is tongue-in-cheek post about a general exploit technique applied to the eBPF subsystem, parodying clout chasing tweeters and overwrought corporate blogs. It could be useful for rootkits, but is not a vulnerability in and of itself.

  • Sep 16, 2024

    Replicating an eBPF SDIV Oops

    TL;DR: Signed division is hard and sometimes it makes the kernel sad.

  • Sep 5, 2024

    Vulnerable eBPF CTF Challenge 01

    A CTF style vulnerable box where you need to find and exploit a mistake in an eBPF program that allows privilege escalation to root.

  • May 5, 2023

    Interactivity is the halting problem in a trench coat.

    Or: please, please, stop piping curl into bash in prod.

1 2 3 4 5 6 Next »

[email protected]:~$

  • Friday Ortiz
  • [email protected]
  • FridayOrtiz
  • rafael-ortiz
  • Senicar
  • Senicar
  • FridayOrtiz

The new original cyber dog. Linux, crypto(graphy), Machine Learning.

<<< this site is part of the [haunted webring] >>>