
Understanding Game Hacking: the Basics
Intro In my ongoing efforts to better understand video game cheating and anti-cheats, I thought to chronicle my hands-on lessons learned in a series of posts; this is the first in said series. Se...

Intro In my ongoing efforts to better understand video game cheating and anti-cheats, I thought to chronicle my hands-on lessons learned in a series of posts; this is the first in said series. Se...

In this post, we’re going to look at options to consider when pursuing a degree to support your entry into professional cybersecurity. While it’s worth mentioning that you don’t necessarily need a ...

The first thing we need to do is get n8n locally installed and running. I chose to locally-host n8n for several reasons: It’s free and - as someone who has never used n8n before - I was leery a...

In my ongoing series of posts looking into AI’s applications to cybersecurity, this ones going to talk about Agentic AI. What are AI Agents? Most people familiar with large language models (LLMs)...

In this post, we’re going to configure an environment that will support a locally-hosted LLM to aid in reverse engineering and binaries. For this, we’ll be using: Virtualbox Ollama with a cor...

Starting Point I’ve been interested in pursuing Anti-Cheat (AC) as a research area and - to that end - I’ve been wanting to setup a virtualized environment to facilitate my R&D efforts. Howeve...

Starting Point I’ve recently become really interested in anti-cheat within video games. As someone who both works in and teaches cybersecurity, it strikes me as bearing a lot of similarities with ...

Starting Point At one point or another, most people looking to carve out a career in cybersecurity look to figure out whether or not they need to go to university for a degree (and if so, what kin...

Prologue These are my writeups of a few of the reverse engineering problems I tackled during this year’s HacktheBox Cyber Apocalypse 2025 CTF. Unfortunately, I could only allocate a few hours in t...

This ended up being a good introductory exercise to injecting shellcode. Rated “Very Easy” by Hack The Box, this pwn binary, this challenge took only a few minutes to exploit having got back into t...