PinnedMaking Windows Bearable for a Linux UserDisclaimer: I am not endorsing Microsoft software in any way. Quite the opposite, in fact. This is just a a series of tips to make the…May 29, 2023May 29, 2023
Published inStackademicHeap exploitation — picoCTF heap0 challengeIn this article, we will go through the heap0 picoCTF challenge and explain how a heap exploitation is performed.Jul 1Jul 1
Published inStackademicMax Non-Divisible Subset — What is there under the hood?This article is intended as an explanation of the math required to solve the following challenge:Aug 8, 2023Aug 8, 2023
Descifrando claves de cifrado asimétrico — Implementando y vulnerando RSAEste post documenta la resolución de un challenge de picoCTF. Se nos brinda un texto cifrado mediante un método asimétrico (RSA) y una…May 16, 2022May 16, 2022
Mapping renewable power plants in Argentina — Dynamic SVG marker creation in foliumWhile going through some Kaggle exercises on data analysis, I learned about the folium library. It is quite an interesting tool, allowing…May 2, 2022May 2, 2022
A short challenge: picoCTF reverse engineeringI am slowly going into the world of CTF, “Capture the Flag”. I am not talking about the first person shooter multiplayer game type, but of…Jan 15, 2022Jan 15, 2022
Una playa en fractales — MatplotlibLos fractales son elementos interesantes, estudiados en diversas ciencias. Figuras que se autoreplican, siendo iguales sin importar desde…Jan 14, 2021Jan 14, 2021