Organisations Should never use in-house triage, Hunters and researchers should only use them as a payment platform. that's it on a napkin.
Read more
Chaining three issues to gain root from a low privileged user.
Read more
The HP Aruba VIA VPN client for Linux contains a local privilege escalation vulnerability that allows any unprivileged local user to gain root access. - CVE-2025-37186
Read more
What Hacklore get's wrong. and the precursor to https://lolwifi.network
Read more
Ghosted Domains coming to haunt you, one more check for your scanners, vendor assurance, OSINT, Supply chain, Appsec and all the rest of that good stuff.
Read more
Poll-Dancing & Age Verification - a critical view of yougov's obvious biased framing of the age verification shit-show
Read more
what laws allow what government departments legal access to information on the end of an IP Address, it's called Juri. after Jurisdiction - https://juri.host/
Read more
What to do when you no longer need a domain
Read more
The wrong people in the room when the decisions where made to reduce citizen data security.
Read more
Threat Modeling is not everyone's cup of tea, but let's threat model everyone's cup of tea.
Read more
EntSec
Who needs to know when a domain has expired ?
It Depends, and it Deepens.
Read more
Ideas
File Folding is a technique that moves a file into hex, and that hex is broken into folder file names in a fashion that can be reconstructed.
Read more
OffSec
Data-Bouncing - The art of indirect exfiltration. Using & Abusing Trusted Domains as a 2nd Order Transport.
Read more
Random
How to implement MFA in Ghost Blog with Cloudflare's Zerotrust Access Policy.
Read more
OffSec
The idea behind three word passwords as a concept is in my opinion a nice nudge in the right direction, In a perfect world, a passphase or a sentence
Read more
Exploitation
I wonder if any of these leaked email address domains are expired, and I wonder if I can buy them and inherit the identities associated with them via password resets
Read more