Posts

Ever wondered how those "weak key" exploits actually work? I made a research tool for it

would this fall under ethical or unethical hacking and where to acquire?

Strange machines showing up in njrat

Protecting your secrets from tomorrow’s quantum risks

Windows bitlocker

I built an open source C2 framework

Is there's a way to access data breaches?

DLL Injection Methods Explained

I built an AI webapp defender that autonomously patches code in response to attacks

If arch has Black Arch and Debian has Kali, does Fedora have a “black hat”

Is this a phishing?

Tool recommendations for vuln/CVE research