security research notebook

Reverse engineering notes and exploit research, kept reproducible.

Short writeups on binaries, systems internals, vulnerability research, and the traces that make a result worth trusting.

latest

Shadow pages and quiet hooks

A compact model for thinking about EPT shadow pages, execute-only mappings, and where a monitor can observe without patching guest bytes.

2 min read research

Recent Notes

Archive
  1. Links and image rendering lab

    A small fixture post showing internal blog links and local images with controllable display sizes.

  2. Math and code rendering lab

    A small rendering test note with LaTeX equations, typed code fences, shell output, and a security-flavored toy model.

  3. Building a tiny triage rig

    A lightweight workflow for turning suspicious binaries into repeatable notes before deeper reversing begins.

  4. UEFI boot notes from a clean room

    Short notes on making firmware experiments less fragile: logging, rollback, hardware assumptions, and failure modes.