Offensive Research & Advisories
We don't just consume threat intel — we generate it. Zero-day disclosures, EDR evasion research, cloud attack techniques, and CTF write-ups.
Privilege Escalation in Enterprise Cloud Agent
Chaining LFI with a misconfigured IAM execution role to achieve SYSTEM access across an entire cloud fleet. Discovered during a Fortune 500 adversary simulation.
Read Advisory →Bypassing User-Land Hooks with Indirect Syscalls
Modern EDRs rely on user-land API hooking. This research demonstrates indirect syscalls in Rust to blind telemetry during live red team operations.
Read Paper →Breaking the AI Sandbox
A multi-stage prompt injection attack that exfiltrated the hidden flag via indirect execution in the AI Village final challenge at DEF CON 33.
Publishing Q3 2026AWS Cross-Account Pivoting via Misconfigured STS Roles
How a single over-permissioned AssumeRole call allowed us to pivot from a compromised SaaS vendor account to their customer's production AWS environment.
Publishing Q4 2026Get New Research First
CVE disclosures, tradecraft papers, and threat intel delivered to your inbox — no marketing, no spam.
Subscribe via Email