Thoughts: It's interesting to read through Trail of Bits' material.The story is about finally pursuing something I've wanted to do for a long time.Oct 3Oct 3
An easy method for setting up an Android Pentest Lab on an Apple Chip M1.Android Pentest LabJun 1, 2023Jun 1, 2023
iOS Security: OS ArchitectureThis write-up details the architecture of the Apple Mobile OS: iOS, which helps you do security analysis further; iOS is a Unix powered…Apr 12, 2022Apr 12, 2022
*Nix File System Hierarchy ExplainedThis write-up intents to explain the file system hierarchy of the UNIX or Linux systems, which helps folks learn or do security research…Mar 22, 2022Mar 22, 2022
A Study of the Web Protocol 2 — The web; HTTP Protocol Logic.The HTTP is an application layer protocol of the web.Jan 7, 2022Jan 7, 2022
A Study of the Web Protocol 1 - Working Logic of the system.We can log in to the system by username and password in the computer system. The computer system will have a superuser account and regular…Jan 7, 2022Jan 7, 2022
The Security in CSP: Learning noteThis is another study notes or learning notes of the security headers after the first one “The study of the security headers — Learning…May 4, 2021May 4, 2021