- Font Updates 001April 25, 2024
- Welcome to the InternetApril 24, 2024
- Product Design Is LostApril 18, 2024
- Similar TypefacesMarch 21, 2024
- Drawing My First FontMarch 11, 2024
- Not Newer, but BetterMarch 5, 2024
- Variable Fonts DemoFebruary 28, 2024
- Apple Deleted My Music LibraryFebruary 10, 2024
- Recently 002January 11, 2024
- An Eames AnthologyJune 20, 2023
- Keeping Aspect Ratios in FigmaMarch 21, 2023
- Case-study: DunnesJuly 11, 2022
- Learning about Reinforcement LearningMay 23, 2022
- Enabling LaTeX support for Mnemosyne on MacOSMay 3, 2022
- On Writing Well by William ZinsserApril 30, 2022
- Recently 001February 28, 2022
- The Wright Brothers by David McCulloughFebruary 18, 2022
- Surely You’re Joking Mr. Feynman by Richard FeynmanFebruary 18, 2022
- Case-study: tryrewrite.comJune 20, 2021
- CVEsApril 10, 2020
- Looking for WaitForSingleObject CallMay 18, 2017
- Using Return Oriented Programming Against DEPFebruary 10, 2017
- Adventures in Linux Kernel — Task 01February 9, 2017
- FreePBX Exploit and Brace ExpansionJanuary 29, 2017
- Exploit Exercises — Protostar Heap 3January 17, 2017
- Exploit Exercises — Protostar Heap 2January 13, 2017
- Exploit Exercises — Protostar Heap 1January 12, 2017
- Exploit Exercises — Protostar Heap 0January 11, 2017
- Exploit Exercises — Protostar Format LevelsJanuary 11, 2017
- Exploit Exercises — Protostar Stack 6January 10, 2017
- Exploit Exercises — Protostar Stack 5January 9, 2017
- Writing Shellcode for Linux x64January 7, 2017
- Windows Privelege Escalation via Token KidnappingOctober 28, 2016
- Getting Password Hashes from Domain ControllerAugust 9, 2016
- Getting Credentials from Unprotected JenkinsJuly 14, 2016
- Writing JIT-spray ExploitDecember 29, 2015