1 Followers
11 Following
13 Posts
Ethical Red teamer
Github forcing me to enable 2FA is some stuff I hate to deal with, can I live with my own choices please?

Native API Preference, I'm loving this

Zig provides comprehensive, low-level access to Windows APIs through its standard library, with a strong emphasis on using Native APIs (from ntdll.dll) over higher-level Win32 APIs (from kernel32.dll) for better performance, fewer dependencies, and richer error handling.

My time with C is definitely coming to an end if Zig really impresses me. I know most people are using Rust and I should probably stick with it, but hey, trying new things and being different isn't a bad thing. Let's see what Zig has to offer and if it's worth it. If Rust users are called Rustaceans, what are Zig users called?
I'm trying to learn how to use Zig for offensive security. I started yesterday and I just don't want to stop. The weirdness is keeping me locked in. Is Zig worth it?
I'm sorry to say this but there is no way Google is backing down on its proposed September 2026 android lockdown, it was meant to happen.
If you care enough and want the Android ecosystem free kindly go through this https://keepandroidopen.org and do something about it. Your input means a lot.
Keep Android Open

Advocating for Android as a free, open platform for everyone to build apps on.

Anyone can bug a hotel or an airbnb, to keep safe, this is what you need to know so you can vehemently fight surveillance.

https://hackaday.com/2026/02/09/ask-hackaday-how-do-you-detect-hidden-cameras/

Ask Hackaday: How Do You Detect Hidden Cameras?

The BBC recently published an exposé revealing that some Chinese subscription sites charge for access to their network of hundreds of hidden cameras in hotel rooms. Of course, this is presumably wi…

Hackaday
User Agent string is quite critical in doing web security. Google, Meta, ... will intentionally block or serve you different or no content based on it.
Malware analysis and Revere Engineering in Ida is fun when you know what you are doing. Here is a collection of some papers that dive quite deep into malware TTPs.
https://github.com/0xi6r/Malware-Analysis-Research
GitHub - 0xi6r/Malware-Analysis-Research: A personalized collection of technical research papers focused on malware analysis. Covers static/dynamic analysis, sandboxing, behavioral classification, threat intelligence extraction, and anti-evasion techniques.

A personalized collection of technical research papers focused on malware analysis. Covers static/dynamic analysis, sandboxing, behavioral classification, threat intelligence extraction, and anti-e...

GitHub
Should You Trust Your VPN Location?

17 out of 20 popular VPNs exit traffic from different countries than they claim. Dig into what that means and why it matters in our VPN report.

Brave overhauls adblock engine, cutting its memory consumption by 75% | Brave

Brave has overhauled its Rust-based adblock engine to reduce memory consumption by 75%, bringing better battery life and smoother multitasking to all users.

Brave