Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
Posts
IT/OT Security frameworks
Published:
When it comes to cybersecurity frameworks, there is a wide range of resources available. They span from highly technical to non-technical and come from all over the world. Some are now considered essential in the field and are recognized and used by almost everyone. The goal of this short article is to provide a brief overview of the most relevant cybersecurity frameworks.
Cross-Compilation
Published:
In this article, I share my experience overcoming a technical challenge while deploying tools on a hardened ARM environment. I detail how I managed to build a functional toolset despite the lack of standard utilities. To access my full technical guide and the specific build recipes I used, please follow the redirection link above.
Data Leak #01
Published:
This article relates a major data breach within the French administration involving banking data. As it mainly concerns French citizens, this article is written in French.
A Trip on PKCS11 Boat
Published:
From smartcards to secure elements, PKCS#11 is the backbone of many modern cryptographic operations; yet for most developers, it still feels like a black box. This article breaks it down from a beginner’s perspective: what it is, why it matters, and how to start using it with real examples.
Linux Persistence Mechanisms
Published:
Persistence is a key stage in any cyberattack: once inside, attackers aim to secure a way back even if their original access is closed. At Black Hat USA 2025, John Hammond highlighted several lesser-known Linux persistence techniques that defenders should watch for.
Le perceptron
Published:
This article gives a brief overview of the basic building block of neural networks: the perceptron. For a change, I’m writing this article in French. Enjoy the read!
(Tutorial) PKI deployment and usage
Published:
This tutorial offers a practical, hands-on walkthrough of everything we’ve covered about certificates and Public Key Infrastructure (PKI).Now it’s time to move from theory to real-world application: you’ll learn how to set up your own private Certificate Authority, issue certificates, and secure your web applications with that satisfying little padlock icon in your browser (for real).
The Role of HSMs in Protecting Cryptographic Keys
Published:
This article presents a specific device that plays a crucial role in protecting the chain of trust in a PKI: the HSM. It serves as a good introduction for those who need to understand the key components of these devices.
PKI (Public Key Infrastructure)
Published:
In this article, I explore Public Key Infrastructure (PKI) and its essential role in establishing trust across digital communications. By the end of this article, you’ll understand the mechanisms that make secure connections possible, far beyond just the padlock icon in your browser, and how PKI prevents attackers from impersonating trusted parties online.
Digital Certificates
Published:
In this article, I discuss digital certificates and their crucial role in securing internet communications. By the end of this article, you will understand what lies behind the small padlock icon that appears on the left side of your browser’s address bar.
Elliptic Curve Cryptography (ECC) - Part 2
Published:
For this second article on Elliptic Curve Cryptography (ECC), we will discuss how elliptic curves can be defined over finite fields, and what group operations can be performed on their points.
Elliptic Curve Cryptography (ECC) - Part 1
Published:
If you’ve ever created an RSA-based SSH key, you might have been surprised by the size of the key it generated. Elliptic Curve Cryptography (ECC), on the other hand, offers much shorter keys while maintaining the same level of security. Since its introduction, ECC has steadily gained popularity and has increasingly replaced RSA for both confidentiality (encryption) and non-repudiation (digital signatures). This is the first post in a series on Elliptic Curve Cryptography.
Advanced Encryption Standard (AES)
Published:
If I were asked to identify a common point between banking transactions, internet communication, and important documents, I would say it’s the need for confidentiality. Confidentiality means preventing unauthorized access to information. At the time of writing this post, one of the most widely used algorithms to ensure confidentiality is AES, also known as Rijndael. This blog post briefly covers everything you need to know about AES.
