RSS.Social

[email protected]:~$

follow: @[email protected]

Posts

Replicating an eBPF SDIV Oops

Vulnerable eBPF CTF Challenge 01

Interactivity is the halting problem in a trench coat.

Stop saying eBPF when you mean cBPF.

Never Stop Reading: Crashing the HaikuOS Port of Cave Story

whoami, who am I? Thoughts on protecting digital and human identities.

BeeSTrING: Critical Vulnerability in BPF Subsystem Allows Fully Unauthenticated RCE as Root

every Boring Problem Found in eBPF

eBPF for security: a beginner’s guide

Learning eBPF through gamification: The Hive CTF Challenge and Walkthrough