_____
 / ____|
| |  __
| | |_ |
| |__| |
 \_____|
  ___
 / _ \
| (_) |
 \___/
 _ __
| '__|
| |
|_|
 _
| |
| |
| |
| |
|_|
  __ _ 
 / _` |
| (_| |
 \__,_|
 _ __  
| '_ \ 
| | | |
|_| |_|
 _ 
(_)
 _ 
| |
| |
|_|
      ___    ___    _ __ ___  
     / __|  / _ \  | '_ ` _ \ 
 _  | (__  | (_) | | | | | | |
(_)  \___|  \___/  |_| |_| |_|
Reverse, Repurpose, Resolve
[ (A)rticles ]

[ (S)oftware ]

[ (L)ost and found ]
[ G (B)lobs ]

[ (T)witter ]
        ___
     __/x x\__
    /  \___/  \
   |\__/   \__/|
   |/  \___/  \|
    \__/   \__/
       \___/
         V       
(1) Hey, abbiamo comprato la security
(2) Windows event forwarding and mis...
(3) All'attacco del WPA2 (PMKID)
(4) TurnItOn is back
(5) Macmakeup 2.0 Released!
(6) Audit delle password su Windows
(7) Privacy e security col DNS
(8) Le VPN ai tempi del coronavirus
(9) Due parole sul reverse engineering dei malware

I'm Marcello Gorlani

This is my place
on the web