All Posts

  • Published on
    In this post, I explore how attackers and red teamers can weaponize the magic SysRq key on Linux. From crashing systems and wiping volatile evidence to killing processes and evading EDRs, I break down how this kernel-level interface — originally designed for recovery — can become a stealthy tool for chaos and persistence. Includes practical abuse examples, anti-forensics tricks, and defensive mitigation.
  • Published on
    This welcome post kicks off my journey into offensive security research, with a focus on malware development, CTFs, and red teaming. I cover key principles every offsec researcher should remember, from documenting failures to thinking like both a developer and an attacker. I’ve also listed essential tools and techniques to get started, including shellcode loaders, API evasion, C2 frameworks, and analysis environments. Whether you're just diving into offsec or leveling up your tradecraft, this blog is here to document the hacks, the fails, and the fun.