Konigsberg Bridge Problem

This article is originally a test page for a few JavaScript libraries and plugins I can use to write code to be processed as rendered graph on the client side....

Shannon Entropy and Uncertainty of Information

Shannon entropy is commonly used in malware analysis, and I actually started writing this article after an attempt to better understand Shannon entropy after reading this paper by Duc-Ly Vu...

Image Processing Convolution Kernels

As someone who’s relatively inexperienced with image processing, I started by looking at random image kernels on the web before applying it on the Matlab environment while I’m testing some...

VulnHub unknowndevice64 Writeup

This is a writeup for VulnHub’s unknowndevice64: 1 challenge. It’s been a while since I last did a VulnHub challenge, so it’s a pretty good exercise. Service Discovery I started...

Getting Certified

Background I have a bit of interest in security, since I’m quite a paranoid regarding the data I own ever since my family bought a shared Windows XP PC to...