First and foremost, I like to keep the focus on learning and responsible research here. It's exciting to explore offensive security tradecraft, don't get me wrong. But I'd like to recognize the importance behind responsible use of the techniques and code I share on this blog. My goal is to enhance security not abuse it. The code I provide on this site is intended for educational purposes and meant to inform the cyber community. Lastly, I want to reiterate that the code on this site should be used responsibly, and I am in no way responsible for misuse. My code is sloppy, so it will be very obvious if I see it being used copy pasta out in the wild by the way 😸 Okay! With that little disclaimer out of the way, enjoy your stay and hit me up on discord if you want to learn more about a given topic, etc.
Quick links to popular content can be found below:
Hi all! Today we have a guest on the blog. Let me introduce you to Phoebe, a hacker extraordinaire who is assisting me in today’s steganography lesson.
I’ll readily admit my discord server inspired this most recent research into a sort of newly discovered UAC bypass! 😸 I see a lot of convos in the discord se...
Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now this is not going to be some crazy beefed out C2. My main...
Back in the good ole days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I wa...