KomSr3llThoughts: It's interesting to read through Trail of Bits' material.The story is about finally pursuing something I've wanted to do for a long time.Oct 3Oct 3
KomSr3llAn easy method for setting up an Android Pentest Lab on an Apple Chip M1.Android Pentest LabJun 1, 2023Jun 1, 2023
KomSr3lliOS Security: OS ArchitectureThis write-up details the architecture of the Apple Mobile OS: iOS, which helps you do security analysis further; iOS is a Unix powered…Apr 12, 2022Apr 12, 2022
KomSr3ll*Nix File System Hierarchy ExplainedThis write-up intents to explain the file system hierarchy of the UNIX or Linux systems, which helps folks learn or do security research…Mar 22, 2022Mar 22, 2022
KomSr3llA Study of the Web Protocol 2 — The web; HTTP Protocol Logic.The HTTP is an application layer protocol of the web.Jan 7, 2022Jan 7, 2022
KomSr3llA Study of the Web Protocol 1 - Working Logic of the system.We can log in to the system by username and password in the computer system. The computer system will have a superuser account and regular…Jan 7, 2022Jan 7, 2022
KomSr3llThe Security in CSP: Learning noteThis is another study notes or learning notes of the security headers after the first one “The study of the security headers — Learning…May 4, 2021May 4, 2021