Posts
-
Decode Me - a Write-Up
-
Exploiting Format String with PwnTools
-
Deep dive into Spring Security - part 2
-
Deep dive into Spring Security
-
GDB - An advanced guide
-
GDB - A beginner guide
-
A road to be a secure dev - From 0 to Kevin! 2nd Edition!
-
A road to be a secure dev - From 0 to Kevin!
-
TDD and FizzBuzz
-
To be true or not to be true, that is the question!
-
How to fix vulnerabilities? (The 'Path Transversal' case)
-
Crafting Secure Software
-
Parcoursup, a long way to be graduated
-
Refactoring code without breaking it
-
Writing better BDD scenario
-
The myth of the 'User'
-
TDD and TPP applied to Prolog
-
Adapt or die!
-
Make Java great again!
-
Event Sourcing under steroids!
-
From Zero to Hero : Building a team of powerful developers
-
High performance Haskell
-
Organization by decantation
-
Hexagonal architecture is dead… Long live to hexagonal architecture!
-
Welcome to Jekyll!
subscribe via RSS