History Stealer | CyberSci June 15th 2025 | CTF Solution

Solution to History Stealer CTF challenge and an overview of my recent contributions to national cybersecurity events.

Posted on: June 17, 2025 11:27 PM

View
We Made a Cyber Army. Kinda.

We accidentally launched early. Built a training platform, started a global cyber team, dropped a dozen CVEs, and secured over 230K websites, all under 7 months without a single government contract or a budget line for coffee.

Posted on: June 17, 2025 05:13 PM

View
The Ebola Outbreak Modeling System

The development of a fictional Ebola outbreak modeling system presents a unique opportunity to explore the theoretical dynamics of a highly lethal pathogen transmitted through an unconventional vector, such as female horse flies. Ebola virus disease (EVD) is a severe hemorrhagic fever with significant public health implications, making it a compelling subject for epidemiological modeling.

Posted on: June 08, 2025 07:54 PM

View
C2 Lingo Solution | iHack CTF 2025

C2 Lingo is a challenge that focuses on malware development, programming & cryptography. The beauty of this challenge is that it's based on real world techniques used by hackers to anonymize their communications between their malware and their command & control servers (C2).

Posted on: June 03, 2025 08:03 AM

View
PS-500 Delta | Utilizing drones for aiding Law Enforcement in car pursuits

A drone to address the chaos of high-speed car chases in the United States & Canada, where police deploy helicopters, multiple patrol cars, and significant resources, creating dangerous conditions for suspects, officers, and bystanders alike.

Posted on: May 26, 2025 04:33 AM

View
CVE Hunting Methodology: This is where the training wheels come off

In this article, I’ll walk you through my CVE hunting methodology, from how I find vulnerabilities to how I go about getting them assigned official CVE IDs. If you’ve ever wondered how to go from poking around a web app to contributing to the global vulnerability database, you’re in the right place.

Posted on: May 20, 2025 02:28 AM

View
Contao’s Laughable “Bug Bounty” Program and Self-Assigned CVEs

Let’s talk about Contao’s so-called bug bounty program and their utterly farcical CVE assignment practices on GitHub. Spoiler alert: it’s a self-congratulatory echo chamber masquerading as a security initiative.

Posted on: May 04, 2025 10:28 PM

View
Introduction to Cyber Threat Intelligence Course

This article is an intro to my upcoming cyber threat intelligence course; the current article will teach you basics of threat intel and takes a sneak peak into fine-tuning LLMs vs using existing AI solutions.

Posted on: April 25, 2025 01:14 AM

View
[Update #2] Mission Cyber Sentinel

A global cybersecurity mission dedicated to securing 250K online assets globally is almost complete.

Posted on: March 10, 2025 03:44 PM

View
Digital Warhead: Dissecting TTPs of a Pro-Taliban Hacking Group

This article discusses behavioral analysis techniques specifically designed to thwart malware forensic efforts.

Posted on: January 12, 2025 06:48 PM

View
Mission Cyber Sentinel – Advancing Global Cybersecurity

Mission Cyber Sentinel is focused on securing online assets by discovering and reporting vulnerabilities in high-impact open-source applications.

Posted on: January 11, 2025 12:32 AM

View