Vulnerability analyses, CTF solutions, reverse engineering notes, and threat research. Technical and unfiltered.