All posts
57 – 2025, Mar 09: Understanding PI Part 1 - A Peak into Digital Internet Architecture
56 – 2025, Mar 01: On the spring semester with AI & Big Data specialization
55 – 2025, Feb 28: On the MDI PGDM-IB Program & details about the exchange year
A break of close to three and a half years
54 – 2021, Oct 20: Workshop on BOF and a variety of related exploits
53 – 2021, June 22: Statelessness - Rootcause of many Security Vulnerabilities
52 – 2021, May 09: Sigreturn Oriented Programming - An Introduction
51 – 2021, March 19: Writing simple LLVM Passes
50 – 2021, March 10: Understanding clang’s SafeStack
49 – 2020, November 30: Simple echo server in Rust
48 – 2020, November 19: What is polling?
47 – 2020, November 11: Is a single thread enough? - Events, Notifications and Event Loop
46 – 2020, November 09: Multithreading and Multiprocessing
45 – 2020, November 08: What does blocking mean?
44 – 2020, November 1: Deciphering Rust’s no_mangle
43 – 2020, November 1: Calling Rust from C
42 – 2020, October 31: Calling C code from Rust
41 – 2020, October 25: Rust’s Primitive Types
40 – 2020, October 11: Rust startup
39 – 2020, October 11: Intro to rustenv
In this gap, I worked on a book about Binary Exploitation. Goal was to build the basics necessary to understand Binary Exploitation and then jump into different Vulnerabilities, Exploit methods etc., Here is the repository. It is work in progress.
38 – 2020, February 23: Bullshiting Myself
37 – 2020, January 03: Writing an ELF Parsing Library - Part9 - PHDR, INTERP and GNU_STACK segment types
36 – 2019, December 09: Writing an ELF Parsing Library - Part8 - Program Header Table
35 – 2019, December 08: Writing an ELF Parsing Library - Part7 - Program Headers
34 – 2019, December 07: Writing an ELF Parsing Library - Part6 - The ELF Header
33 – 2019, December 06: Writing an ELF Parsing Library - Part5 - Implementing Basic API
31 – 2019, December 05: Writing an ELF Parsing Library - Part4 - Internal Data Structures - 2
30 – 2019, December 02: Writing an ELF Parsing Library - Part3 - Internal Data Structures - 1
29 – 2019, November 15: Writing an ELF Parsing Library - Part2 - Piloting the Library
28 – 2019, November 15: Writing an ELF Parsing Library - Part1 - What is ELF?
27 – 2019, November 10: Understanding the Loader - Part1 - How does an executable get loaded to memory?
26 – 2019, October 30: Breaking ASLR
25 – 2019, October 03: I am not an Imposter
24 – 2019, September 2019: Introduction to Wireshark
23 – 2019, May 22: Installing moloch!
22 – 2019, April 28: Analysis of the Apple Card
21 – 2019, March 30: Return Oriented Programming - Part2
20 – 2019, March 06: Defeating Write XOR Execute - Ret2Libc - Part2
19 – 2019, March 04: Bypassing Write XOR Execute - Ret2Libc - Part1
18 – 2019, February 01: Operating System and Networking Stack - Part2
17 – 2019, February 01: Operating System and Networking Stack - Part1
16 – 2019, January 16: Return Oriented Programming - Part1
15 – 2018, December 28: How does the Operating System defend itself?
14 – 2018, December 08: Buffer Overflow Vulnerability - Part3
13 – 2018, December 02: Exploitation using Code Injection - Part2
12 – 2018, November 27: Setting up a Blog using Jekyll - Part2
11 – 2018, November 27: Setting up a Blog using Jekyll - Part1
10 – 2018, October 20: Exploitation using Code Injection - Part1
9 – 2018, October 08: Buffer Overflow Vulnerability - Part2
8 – 2018, October 02: Buffer Overflow Vulnerability - Part1
7 – 2018, September 22: Program Execution Internals - Part2
6 – 2018, September 10: Program Execution Internals - Part1
5 – 2018, August 18: Memory Layout of a Process
4 – 2018, August 12: Introduction to x86 Assembly Programming
3 – 2018, July 02: What does an Executable contain? - Internal Structure of an ELF Executable - Part1
2 – 2018, June 21: Internals of Compiling - Journey from C/C++ program to an Executable
1 – 2018, June 11: Why I started this blog?