Hello, Visitor!
Security is one of the most discussed topics in the tech world, yet it often remains at the surface level. However, true security starts at the lowest levels of a system 😊. This blog aims to shed light on the world of low-level security, covering everything from hardware-level vulnerabilities to operating systems, memory management, and binary exploitation.
Here, you will find in-depth technical analyses, security research involving low-level programming languages like C and Assembly, and real-world case studies. My main aim is to explore ways to make systems more secure.
- Secure Coding & Mitigation Techniques: Discussing best practices for writing secure low-level code, implementing mitigations like ASLR, DEP, and stack canaries.
- Operating System Internals & Security Mechanisms: Understanding OS structures, syscall hooking, sandboxing, and defense mechanisms against kernel and user-space threats.
- Reverse Engineering & Malware Analysis: Breaking down the internals of binaries, studying malware behavior, and uncovering security flaws through static and dynamic analysis.