....      ..                                                          .x+=:.   
      +^""888h. ~"888h                                                       z`    ^%  
     8X.  ?8888X  8888f               .d``                       .u    .        .   
    '888x  8888X  8888~        u      @8Ne.   .u        .u     .d88B :@8c     .@8Ned8" 
    '88888 8888X   "88x:    us888u.   %8888:u@88N    ud8888.  ="8888f8888r  .@^%8888"  
     `8888 8888X  X88x.  .@88 "8888"   `888I  888. :888'8888.   4888>'88"  x88:  `)8b. 
       `*` 8888X '88888X 9888  9888     888I  888I d888 '88%"   4888> '    8888N=*8888 
      ~`...8888X  "88888 9888  9888     888I  888I 8888.+"      4888>       %8"    R88 
       x8888888X.   `%8" 9888  9888   uW888L  888' 8888L       .d888L .+     @8Wou 9%  
      '%"*8888888h.   "  9888  9888  '*88888Nu88P  '8888c. .+  ^"8888*"    .888888P`   
      ~    888888888!`   "888*""888" ~ '88888F`     "88888%       "Y"      `   ^"F     
           X888^"""       ^Y"   ^Y'     888 ^         "YP'                             
           `88f                         *8E                                            
            88                          '8>                                            
            ""                           "                                             
    

Welcome to the papers page, here you'll find our papers.
learn how to write papers to here at /contributing

Programming

Bit Shift Operators
Monads
Debugging with LLDB
Syscalls (PT_BR)
Lambda Calculus
BRDF


Cyber Security

Red Teaming (PT_BR)
Direct Kernel Object Manipulation (PT_BR)
Threat Hunting (PT_BR)
Heap Exploitation (PT_BR)
Linux Privilege Escalation (PT_BR)
Return Oriented Programming [ROP] (PT_BR)
Attacking Json Web Tokens [JWT] (PT_BR)
ROPing the Kernel (PT_BR)
Linux Defense Evasion (PT_BR)
Kerberoasting (PT_BR)
A guide on anonymity (PT_BR)
Cors Exploitation (PT_BR)
Buffer Overflow (PT_BR)

Mathematics

Arithmetic Progression (PT_BR)
Geometrical Progression (PT_BR)
Methods on Polynomial Degree Reduction (PT_BR)