Blog
Thoughts on AI, security research, systems programming, and more.
Jan 21
2026
2026
The Archaeology of Attack: How DMS Reads What Malware Tries to Erase
What if your scanner could see what the operating system pretends doesn't exist? A deep dive into raw disk forensics, deleted file resurrection, an...
Jan 18
2026
2026
Emergent Introspective Awareness in LLMs: Can AI Know What It's Thinking?
A deep dive into groundbreaking research on LLM introspective awareness, exploring how models can detect their own internal states, and practical p...
Feb 10
2024
2024
Setting Up a Safe Malware Analysis Environment
A comprehensive guide to setting up an isolated environment for safe malware analysis using REMnux and virtual machines.
Jan 15
2024
2024
Getting Started with Context Engineering for LLM Applications
Learn the fundamentals of context engineering and how to build more effective LLM applications through strategic context management.