Posts

I built an AI webapp defender that autonomously patches code in response to attacks

If arch has Black Arch and Debian has Kali, does Fedora have a “black hat”

Is this a phishing?

Tool recommendations for vuln/CVE research

did microsoft fix old trick?

Coinbase Quantum Advisory Council Publishes Position Paper on Quantum Computing and Blockchain

How to get into a wifi network without a password

Lab review

Are there examples of any "Good Viruses"?

How Attackers Are Actually Getting In

Command Execution via Drag-and-Drop in Terminal Emulators

[VulnPath Update] New Feature: "My Tech Stack"