Crossroads of cybersecurity, philosophy and innovation. Read on for best security practices, how to's, tutorials and sensational tales of hacking
A gentle introduction to userspace instrumentation · Before we start, I want to highlight the difference between bpftrace and eBPF programs. eBPF...
In this blog, we will continue with tracing. We'll aim to get a basic understanding of: How processes work Exit codes Forking of processes Exit...
Enter God mode · Welcome, this is the first in a series of articles that I will be writing about the eBPF - in my quest to educate myself, and...
I'm looking at you, Azure. · Network traffic monitoring is essential for large-scale networks and organizations to actively detect and prevent intrusions...
Recently, I headed to Pastebin, wanting to quickly copy-paste a script I was working on to another computer. Pastebin is notorious for breaches, leaks...
This is one of those situations where I had to get through a task for which there was not too much publicly available documentation. Hence I'm writing...