My experience with SANS FOR610 Reverse-Engineering Malware course and GREM certification exam - what worked, what didn't, and practical advice for others considering this path.
A detailed look at the tools and development environment I use for exploit development and binary analysis, from my choice of Binary Ninja as primary disassembler to the Python frameworks and debugging tools that make vulnerability research efficient.
A deep dive into my personal exploit development lab setup using Proxmox VE, including hardware choices, network isolation strategies, and VM configurations that create a safe, isolated environment for security research.
A personal reflection on balancing two technical worlds—postal equipment maintenance and cybersecurity research. This post explores my non-traditional career path, the surprising transferable skills between mechanical troubleshooting and security work, and how impostor syndrome affects career transitioners. Includes practical advice for others navigating similar paths.