Blog


Harnessing Semgrep for Multi-File Vulnerability Detection and Reducing False Positives

Java Serialization: Understanding and Mitigating Risks

Cryptographic modes and catastrophic implementations

Predictions with linear regression

Evading AV detection with encryption and side-channels

Parking at FEUP

Building my own VPC

Honeypots part one

(In)Secure Digital Wallets

Analyzing 3 months of attacks