All Posts

Exploring the depths of computer science, one post at a time.

⌘B
Use arrow keys to navigate results, Enter to select, Escape to close

Windows Process Enumeration Mastery

12 min read

A beginner-friendly guide to Windows process discovery with CreateToolHelp32Snapshot and EnumProcesses. Learn security research techniques, malware development fundamentals, and system programming with practical examples.

A practical guide to the Model Context Protocol (MCP) – the open standard that lets AI tools like ChatGPT and Claude connect to real-world data, tools, and workflows. Learn what MCP is, why it matters, and how to build your first MCP server.

Kubernetes 101

6 min read

A beginner-friendly Kubernetes guide with engaging analogies, step-by-step tutorials, and a clear roadmap from basics to production deployment. Perfect for students and developers starting with container orchestration.

Explore the essential memory allocation techniques in C on Windows: malloc, HeapAlloc, and LocalAlloc. This guide provides practical examples, explains when to use each function, and demonstrates how to write and verify data in dynamically allocated memory.

AI Agents 101

3 min read

Just a What are AI Agents and some of answer for my Question about AI Agents and How it does work

The landscape of large language models (LLMs) is rapidly evolving, and researchers at Google DeepMind and KAIST AI have introduced a groundbreaking architecture that could reshape how we build and deploy AI systems. **Mixture-of-Recursions (MoR)** represents a paradigm shift in AI efficiency, combining parameter sharing with adaptive computation to deliver unprecedented performance improvements while dramatically reducing computational costs.

Are you ready to dive into the exciting world of Capture The Flag (CTF) competitions? Whether you're a seasoned cybersecurity enthusiast or a newcomer eager to learn, hosting your own CTF challenges can be a rewarding experience. In this comprehensive guide, we will walk you through the entire process of setting up CTFd, one of the most popular platforms for CTF events.

Reverse Shell

5 min read

I’m documenting my journey learning about reverse shells, focusing on their function, common tools, and security implications in cybersecurity. This exploration highlights their role in both ethical hacking and potential security threats.