A compact model for thinking about EPT shadow pages, execute-only mappings, and where a monitor can observe without patching guest bytes.
security research notebook
Reverse engineering notes and exploit research, kept reproducible.
Short writeups on binaries, systems internals, vulnerability research, and the traces that make a result worth trusting.
latest
Recent Notes
Archive- Links and image rendering lab
A small fixture post showing internal blog links and local images with controllable display sizes.
- Math and code rendering lab
A small rendering test note with LaTeX equations, typed code fences, shell output, and a security-flavored toy model.
- Building a tiny triage rig
A lightweight workflow for turning suspicious binaries into repeatable notes before deeper reversing begins.
- UEFI boot notes from a clean room
Short notes on making firmware experiments less fragile: logging, rollback, hardware assumptions, and failure modes.