• Static Analysis with GNN-based Malware Classifier

    Static Analysis with GNN-based Malware Classifier

    The automatic detection of malicious software represents one of the central challenges in contemporary cybersecurity. The continuous evolution of obfuscation, packing, and polymorphic mutation techniques has progressively reduced the effectiveness of traditional signature-based methods. In this context, the adoption of machine learning techniques has opened new perspectives but has also highlighted structural limitations when applied…

  • How I (almost) passed the CRTP certification

    How I (almost) passed the CRTP certification

    The CRTP certification from Altered Security is a hands-on program designed to teach red team professionals Active Directory penetration testing techniques. The course combines practical labs, guided modules, and interactive exercises, allowing participants to understand AD enumeration, privilege escalation, lateral movement, and persistence in realistic enterprise environments. We will analyze the course itself, and I…

  • Play Table Tennis with AI

    Play Table Tennis with AI

    Imagine a world where a robotic arm flawlessly executes a backhand smash or anticipates your every spin serve. This is not science fiction—it is the forefront of artificial intelligence in action. In this project, “Play Table Tennis with AI”, we explore how advanced machine learning techniques enable machines to perceive, predict, and react with precision,…

  • Parallelize Binary Tree Search using CUDA and OpenMP

    Parallelize Binary Tree Search using CUDA and OpenMP

    In this article, we explore a Parallel Binary Tree Search implementation that leverages both CUDA and OpenMP to achieve high-performance computing. Binary tree search is a fundamental algorithmic technique, and by parallelizing it, we can dramatically reduce computation time, particularly for large datasets. To accomplish this, we rely on two powerful technologies: OpenMP and CUDA….