home blog reading twitter about

reading log

I read very infrequently, this might never get updated.

A Guide to Kernel Exploitation
still reading | by Enrico Perla and Massimiliano Oldani | started 21st June, 2019

Terrorism and Counterintelligence: How Terrorists Elude Detection
still reading | by Blake Mobley | started sometime in April