History Stealer | CyberSci June 15th 2025 | CTF Solution
Solution to History Stealer CTF challenge and an overview of my recent contributions to national cybersecurity events.
Posted on: June 17, 2025 11:27 PM
ViewWe Made a Cyber Army. Kinda.
We accidentally launched early. Built a training platform, started a global cyber team, dropped a dozen CVEs, and secured over 230K websites, all under 7 months without a single government contract or a budget line for coffee.
Posted on: June 17, 2025 05:13 PM
ViewThe Ebola Outbreak Modeling System
The development of a fictional Ebola outbreak modeling system presents a unique opportunity to explore the theoretical dynamics of a highly lethal pathogen transmitted through an unconventional vector, such as female horse flies. Ebola virus disease (EVD) is a severe hemorrhagic fever with significant public health implications, making it a compelling subject for epidemiological modeling.
Posted on: June 08, 2025 07:54 PM
ViewC2 Lingo Solution | iHack CTF 2025
C2 Lingo is a challenge that focuses on malware development, programming & cryptography. The beauty of this challenge is that it's based on real world techniques used by hackers to anonymize their communications between their malware and their command & control servers (C2).
Posted on: June 03, 2025 08:03 AM
ViewPS-500 Delta | Utilizing drones for aiding Law Enforcement in car pursuits
A drone to address the chaos of high-speed car chases in the United States & Canada, where police deploy helicopters, multiple patrol cars, and significant resources, creating dangerous conditions for suspects, officers, and bystanders alike.
Posted on: May 26, 2025 04:33 AM
ViewCVE Hunting Methodology: This is where the training wheels come off
In this article, I’ll walk you through my CVE hunting methodology, from how I find vulnerabilities to how I go about getting them assigned official CVE IDs. If you’ve ever wondered how to go from poking around a web app to contributing to the global vulnerability database, you’re in the right place.
Posted on: May 20, 2025 02:28 AM
ViewContao’s Laughable “Bug Bounty” Program and Self-Assigned CVEs
Let’s talk about Contao’s so-called bug bounty program and their utterly farcical CVE assignment practices on GitHub. Spoiler alert: it’s a self-congratulatory echo chamber masquerading as a security initiative.
Posted on: May 04, 2025 10:28 PM
ViewIntroduction to Cyber Threat Intelligence Course
This article is an intro to my upcoming cyber threat intelligence course; the current article will teach you basics of threat intel and takes a sneak peak into fine-tuning LLMs vs using existing AI solutions.
Posted on: April 25, 2025 01:14 AM
View[Update #2] Mission Cyber Sentinel
A global cybersecurity mission dedicated to securing 250K online assets globally is almost complete.
Posted on: March 10, 2025 03:44 PM
ViewDigital Warhead: Dissecting TTPs of a Pro-Taliban Hacking Group
This article discusses behavioral analysis techniques specifically designed to thwart malware forensic efforts.
Posted on: January 12, 2025 06:48 PM
ViewMission Cyber Sentinel – Advancing Global Cybersecurity
Mission Cyber Sentinel is focused on securing online assets by discovering and reporting vulnerabilities in high-impact open-source applications.
Posted on: January 11, 2025 12:32 AM
View