This blog is about sharing Info-Sec stuff that interests us. It will include almost anything from scripting, reversing, exploitation, solving boot2root challenges to CTFs. We like to break things and create things to break some more things ;). We may also document some of our experiments and failures while trying to break/make somethings. Defending attacks is also part of our lives and we would like to document it as well to help others.