HTB — Driver's Shadow
A critical Linux server began behaving erratically under suspected Volnaya interference, so a full memory snapshot was captured for analysis. Stealthy components embedded in the dump are altering …...
Discover my latest CTF writeups, cybersecurity projects, and technical explorations.
Here are my most recent articles and writeups
A critical Linux server began behaving erratically under suspected Volnaya interference, so a full memory snapshot was captured for analysis. Stealthy components embedded in the dump are altering …...
Study and evaluation of TranFuzz for generating black-box adversarial examples on image classification models.
Investigation and experimentation with laser fault injection techniques to analyze hardware vulnerabilities. Includes attack setups, power and pulse width parameters, and resulting BBICS behaviors.
A machine learning project comparing deep learning models, including CNNs and MLPs, for image prediction using the CIFAR-3 dataset. Demonstrates training, evaluation, and performance analysis of …...
Study and implementation of the Ascon128 lightweight authenticated encryption algorithm, focusing on its efficiency and security for resource-constrained environments and development using …...
Development of COMIF, a mobile app designed for secure communication and remote management in a business assistance context, leveraging modern mobile technologies.
Development of a multiplayer console typing game in C using sockets and threads. Focuses on managing multiple clients, time tracking, and score ranking in a client-server architecture.
Community-driven project aimed at reducing the digital divide for elderly learners through weekly digital literacy training sessions. Includes curriculum design, hands-on teaching, and certification …...
Implementation of a predictive typing program in C using hash tables and trie data structures to suggest next words in real time based on word frequency and user input.
This is just a preview showing 9 of 10 total posts.