Published inInfoSec Write-upsLarge Ransomware Models: Hijacking LRMs With Chain-of-Thought ReasoningUsing the “reasoning” in large reasoning models against them4d ago4d ago
Published inOSINT TeamYou Should Make a Cybersecurity Blog……or maybe not? Maybe so? Mayb-…Mar 41Mar 41
Published inOSINT TeamNooope: DarkComet Backdoor Malware AnalysisI’m not going back there…Jan 30Jan 30
Published inInfoSec Write-upsCutting Off Skynet: Running Local LLMs With OllamaNothing to see here…Jan 28Jan 28
Published inOSINT TeamSowing Discord: Weaponizing Discord’s CDN and WebhooksDiving further into the abuse of the popular streaming/chat platform.Jan 14Jan 14
Published inInfoSec Write-upsUsing Discord as a C2It’s good for gaming, streaming, hacking…Jan 92Jan 92
Published inLevel Up CodingAddressing Go’s Compiled Binary FilesizeWhile limited, you have options.Dec 31, 20243Dec 31, 20243
Published inInfoSec Write-upsWorking in Cyber Threat Intelligence (CTI)Benefits, Drawbacks, and MisconceptionsDec 27, 20245Dec 27, 20245
Published inOSINT TeamGotta Catch ’Em All: IMPlantor Malware AnalysisI’m collecting custom malware tools like they’re…Dec 8, 2024Dec 8, 2024
Published inOSINT TeamRATception: RemcosRAT Malware AnalysisWait… didn’t I just see you a minu-…Dec 5, 20241Dec 5, 20241