Skip to main content
Security is one of the most discussed topics in the tech world, yet it often remains at the surface level. However, true security starts at the lowest levels of a system 😊. This blog aims to shed light on the world of low-level security, covering everything from hardware-level vulnerabilities to operating systems, memory management, and binary exploitation. Here, you will find in-depth technical analyses, security research involving low-level programming languages like C and Assembly, and real-world case studies. My main aim is to explore ways to make systems more secure.
  • Secure Coding & Mitigation Techniques: Discussing best practices for writing secure low-level code, implementing mitigations like ASLR, DEP, and stack canaries.
  • Operating System Internals & Security Mechanisms: Understanding OS structures, syscall hooking, sandboxing, and defense mechanisms against kernel and user-space threats.
  • Reverse Engineering & Malware Analysis: Breaking down the internals of binaries, studying malware behavior, and uncovering security flaws through static and dynamic analysis.