/ posts
A deep dive into Linux seccomp-BPF — building syscall sandboxes from raw BPF filters to production-grade policies, with practical C examples and analysis of how Chrome, Docker, and systemd use…
A deep dive into using eBPF to build high-performance, kernel-level security monitoring tools — covering syscall tracing, network inspection, and intrusion detection with practical Python examples.
Every call to malloc hides a small miracle of systems engineering. In the time it takes your program to allocate 16 bytes, glibc’s heap allocator has consulted a multi-tiered bin system, potentially…
In this comprehensive tutorial, I walk through building your own local AI system using Qwen 3 and Ollama. Learn how to create powerful RAG (Retrieval-Augmented Generation) systems and AI agents that…
Build a modern Security Information and Event Management (SIEM) system powered by AI and Large Language Models. This tutorial demonstrates how to leverage LLMs for intelligent log analysis, anomaly…
Learn to build a real-time Intrusion Detection System (IDS) from scratch using Python and powerful open-source libraries. This hands-on guide covers network packet analysis, signature-based…