PinnedPublished inProDefenseMachine Learning Evasion Attacks: How Adversaries Trick AI ModelsA deep dive into how adversarial attacks manipulate machine learning models, the types of evasion attacks, and real-world implications.Mar 17Mar 17
PinnedPublished inProDefenseSo you found Auth0 secrets, now what?Advanced Exploitation Techniques with Auth0 CredentialsDec 11, 20231Dec 11, 20231
The OSI Model: Networking’s Guidebook, Not Its RulebookThe OSI model is not a rigid rulebook but a conceptual framework that simplifies networking concepts.Jan 19Jan 19
Published inProDefenseBuilding an AppSec Program: Part 1 of a 4-Part Series on Application SecurityHi there! You might know me from my technical deep dives into pentesting, exploit development, and zero-day research. Today, I’m shaking…Jun 20, 20241Jun 20, 20241
Published inProDefenseHawk’s Prey: Snatching SSH CredentialsCrafted in Golang, Hawk not only captures administrative credentials used by sshd, sudo, passwd, and su services but also exfiltrates them!Apr 26, 2024Apr 26, 2024
Published inProDefenseHacking Android Apps With FridaFinding AWS Credentials in Android AppsFeb 26, 2024Feb 26, 2024
Published inProDefenseHacking the internet (literally)This week I published a new tool called GitScanner. Its a basic tool, that scans domains for publicly exposed .git folder.Sep 15, 20231Sep 15, 20231
Published inProDefenseHacking SEO: Getting to the Top with AI-Generated ContentHow to make your website the TOP Google search.Aug 6, 2023Aug 6, 2023
Published inProDefenseAccessing Hundreds of RDS Databases with AD Credentials Using Python and JDBCOvercoming Network Domain Authentication Challenges to Achieve Large-Scale Database AccessAug 5, 20231Aug 5, 20231