Security, Cryptography & Exploitation

Focus: attacker mindset + defensive systemsโ€”understanding both sides of security.


Cryptography Foundations

Mathematical foundations of security.

Topic Description
Cryptography Fundamentals Symmetric, asymmetric, hashing

General Cybersecurity

Broad security concepts and practices.

Topic Description
Cybersecurity Projects Security fundamentals
Ethical Hacking & Pentesting Authorized security testing

Secure Programming

Writing code that resists attack.

Topic Description
Secure C & Exploit Awareness Writing secure C code
C Secure Coding Defensive programming

Binary Analysis & Reverse Engineering

Understanding compiled code.

Topic Description
Binary Analysis Analyzing executables
Disassembly from Scratch Reading assembly code
Reverse Engineering Linux Linux RE techniques

Malware & Exploitation

Understanding attacker techniques.

Topic Description
Malware Internals How malware works
CVE & Exploit Databases Studying real vulnerabilities

Learning Tips

  1. Think like an attacker: Understand offense to build defense
  2. Practice legally: Use CTFs, labs, authorized testing
  3. Study real CVEs: Learn from actual vulnerabilities
  4. Understand the stack: Memory, assembly, OS internals
  5. Stay ethical: Security knowledge carries responsibility

โ† Back to all projects