Yet another IT security blog with random periodicity. It may also contain posts related to some other topics, but always within the scope of my projects and research (e.g. a workaround in order to have a library working in a given system).
I’ll use this blog to document my scripts in case I need to come back to revise them and I don’t understand why I did this or that. It will also help me as a quick reference guide for stuff I use at work or in my personal projects.
If someone ever reads this first post, just know that you are very welcome to comment, correct mistakes and help me improve the info in this blog.
I’ll try to have a “References” section in all my posts as a way to have my “bookmarks” on a specific topic all together and accessible from any computer with an internet connection.
To give you an idea of what I’m going to talk about, I’ll just say that my main interests in infosec are Malware Analysis, Reverse Engineering, Exploiting, CTF, trolling and, lately, I’ve also been in contact with hardware hacking.
See you around!