Security research from the metal up.
SecurityLab is the depth track: exploit research, systems internals, and high-signal security engineering judgment.
The promise
- Depth over breadth: fewer posts, higher signal.
- Systems-first: internals, performance, correctness, and where assumptions fail.
- Hard tradeoffs: threat models, exploitability, mitigations, and real-world constraints.
Start here
- Fundamentals: /blog/ — research notes + deep dives.
- Exploits & analysis: /projects/ — demos, tooling, writeups.
- Walkthroughs: /videos/ — visual explanations and lab tours.
What you’ll find here
1) Exploit research
Root causes, primitives, mitigation bypasses, and what makes bugs actually exploitable.
2) Systems internals
OS / runtime internals, performance, debugging, and “why the machine behaves like that.”
3) High performance & distributed systems
Performance engineering and distributed-systems reality: latency, throughput, contention, failure modes, and designing for observability.
4) Security engineering judgment
Threat models, tradeoffs, incident lessons, and design reviews.
5) Lab notes & tools
Reproducible environments, scripts, and small tools that support research.
Work with me
If you need help with a security review, exploitability assessment, hardening plan, or systems deep-dive, email: [email protected]