Cyber Resources

Cyber Resources by Freddie This is a collection of all the best resources I’ve learnt from and used in the past year of my cyber security learning. This is in no means a complete list, and wi...

Strace - Bash Keylogger

Introduction System calls are used by processes to interact with the kernel. For example if a process wants to read or write to a file, they must make a system call to do so. To see this in prac...