Posts
Decode Me - a Write-Up
Exploiting Format String with PwnTools
Deep dive into Spring Security - part 2
Deep dive into Spring Security
GDB - An advanced guide
GDB - A beginner guide
A road to be a secure dev - From 0 to Kevin! 2nd Edition!
A road to be a secure dev - From 0 to Kevin!
TDD and FizzBuzz
To be true or not to be true, that is the question!
How to fix vulnerabilities? (The 'Path Transversal' case)
Crafting Secure Software
Parcoursup, a long way to be graduated
Refactoring code without breaking it
Writing better BDD scenario
The myth of the 'User'
TDD and TPP applied to Prolog
Adapt or die!
Make Java great again!
Event Sourcing under steroids!
From Zero to Hero : Building a team of powerful developers
High performance Haskell
Organization by decantation
Hexagonal architecture is dead… Long live to hexagonal architecture!
Welcome to Jekyll!
subscribe via RSS