About:

The website focuses on offensive security and software engineering.

Website:

Specializations:

Subscribe to RSS:
The author shares their experience designing OSINT challenges for the Tengucon CTF event. They detail several challenges, including identifying a suspect through a PDF, finding a phone number via a password-protected zip file, dec...
The post discusses a detailed investigation into a data leak associated with KIMSUKI, revealing that the perpetrators may be Chinese-affiliated. It outlines the discovery of sensitive information, including browser histories, pass...
The blog post is a detailed write-up of a penetration testing exercise on a fictional system called SolarLab. The author describes their process of reconnaissance, scanning, and exploiting vulnerabilities in the system, including ...
The blog post discusses the creation of a shellcode loader using Golang, detailing the components and processes involved in writing malware. It explains the concepts of shellcode and loaders, their roles in cybersecurity, and prov...
A userland keylogger for Linux is developed and explained, focusing on its features, implementation, and educational value for understanding Linux internals.
Moltbot poses significant security risks due to vulnerabilities like prompt injection, urging users to exercise caution when using AI agents that access sensitive data.
The blog post is a detailed write-up of a penetration testing exercise on a Medium-level Windows box named 'tombwatcher' from HackTheBox. The author describes the process of exploiting Active Directory Certificate Services (ADCS) ...
The author shares a detailed walkthrough of solving the 'puppy.htb' Medium-level box on HackTheBox, focusing on techniques used in penetration testing within a Windows Active Directory environment. The post covers initial reconnai...
The blog post provides a detailed write-up on exploiting a Windows box running Active Directory, focusing on network scanning with Nmap, certificate usage in LDAP, and various enumeration techniques. It discusses the discovery of ...
The blog post discusses the author's fascination with Advanced Persistent Threats (APTs), particularly focusing on a recent incident involving the KIMSUKY group, which is allegedly linked to North Korea. The author shares observat...
The blog post is a detailed write-up of a Linux lab challenge from Hackthebox, focusing on the exploitation of a web application that allows users to register and run their own machine learning models. The author describes the rec...
The blog post critiques a report published by AI-research company Anthropic regarding a sophisticated cyber espionage operation attributed to a Chinese state-sponsored group. The author expresses disappointment over the lack of de...
The author discusses the true innovation behind Large Language Models (LLMs), arguing that their strength lies in understanding user intent rather than merely generating content. They emphasize that LLMs serve as interfaces for tr...
The author recounts their experience building an Arduino project for school that involves monitoring WiFi packets and sending alerts via MQTT. They faced numerous challenges, including issues with hardware reliability, software se...
A guide on setting up Windows 11 on QEMU, addressing network configuration and driver installation challenges encountered during the process.
Creating a traceroute tool using the ICMP protocol is straightforward, as demonstrated through a simple Golang implementation that maps network paths.
The article discusses the landscape of Automotive Cybersecurity, emphasizing the industry's scale and the importance of security following notable hacking incidents, such as the 2015 Jeep Cherokee hack. It outlines various attack ...