research


Who Am I? Conditional Prompt Injection Attacks with Microsoft Copilot
Ropci deep-dive for Azure hackers
PenTest Magazine Open Source Toolkit: ropci
ROPC - So, you think you have MFA?
Malicious Python Packages and Code Execution via pip download
Offensive BPF: Using bpftrace to sniff PAM logon passwords
Post Exploitation: Sniffing Logon Passwords with PAM
Grabbing and cracking macOS hashes
Flipper Zero - Initial Thoughts
Gitlab Reconnaissance Introduction
Log4Shell and Request Forgery Attacks
Offensive BPF: Understanding and using bpf_probe_write_user
Offensive BPF: Sniffing Firefox traffic with bpftrace
Offensive BPF: What's in the bpfcc-tools box?
Offensive BPF: Detection Ideas
Offensive BPF: Using bpftrace to host backdoors
Offensive BPF: Malicious bpftrace 🤯
Offensive BPF! Getting started.
Abusing Application Layer Gateways (NAT Slipstreaming)
Race conditions when applying ACLs
2600 - The Hacker Quarterly - Pass the Cookie Article
Active Directory and MacOS
Google Leaks Your Alternate Email Addresses to Unauthenticated Users