Public Research Efforts
Data-driven security initiatives focused on global threat signaling, vulnerability prioritization, and machine-learning driven offensive automation.
Threat Intelligence Metrics
Continuous ingestion and analysis of global threat feeds to generate high-fidelity metrics and attribution insights. Mapping the shift from raw signal to actionable defensive signal.
Explore Metrics
Vulnerability & Remediation
Automated parsing and prioritization of the US DHS National Vulnerability Database (NVD). Focused on identifying remediation efficiency and the delta between disclosure and patch saturation.
View Vuln Data
Rugged SecDevOps Testing
Hardening the software lifecycle through automated attack simulation. A curated library of adapters and testing plans designed to "be mean to your code" before production deployment.
View Test Plans
Gyoithon: AI-Driven PenTesting
A machine-learning framework designed to pass the Hacker Turing Test. Leveraging genetic algorithms and deep neural networks to automate complex offensive security workflows with human-like precision.
Commercial Access OnlyVulnerability Disclosures & Presentations
Open Source Fairy Dust
Presented research revealing flaws in internet infrastructure architecture and their economic and national security impacts.
View PresentationBackdooring Git & Version Control
Explored cryptographic weaknesses and supply chain attacks via Git internals, demonstrating how code breaches jeopardize development pipelines.
View PresentationBasecamp Infrastructure Analysis
Discovered and responsibly disclosed critical vulnerabilities within Basecamp and 37signals infrastructure.
View DisclosureApache Solr & Jetty Vulnerability
Identified a critical vulnerability (SOLR-4861) affecting Apache Jetty and Solr, coordinating a secure resolution with the Apache Foundation.
View AdvisorySecurity Onion CapMe Vulnerability
Uncovered vulnerabilities within the Security Onion CapMe interface, ensuring they were patched before adversaries could leverage them.
View AdvisoryScalr Infrastructure SQLi
Discovered SQL injection and input validation vulnerabilities within the Scalr cloud management platform.
Read ResearchPandora DDoS Botnet Nullification
Investigated the command-and-control infrastructure of the Pandora botnet, revealing vulnerabilities to dismantle its operations.
Read ResearchIS Administration & Architecture
Technical Editor for "Organizational, Legal, and Technological Dimensions of IS Admin," a reference work bridging IT system administration with legal considerations.
View PublicationLDAP Tool Box XSS
Identified Cross-Site Scripting vulnerabilities within the LDAP Tool Box self-service password application.
View AdvisoryKeywhiz Secret Management
Identified vulnerabilities within Block's Keywhiz secret management system regarding secret sanitation and handling.
View Pull RequestjQuery Core XSS Vulnerability
Discovered a widespread Cross-Site Scripting vulnerability within the core jQuery library (Ticket #12254), impacting millions of deployments.
View Bug ReportHack The Box Elite Hacker
Reached the rank of Elite Hacker in competitive exploitation across Solaris, FreeBSD, Linux, and Windows environments.
View ProfileHTTP Cookie DoS Vulnerabilities
Analyzed anomalies in HTTP and Cookie RFC implementations to uncover novel Denial-of-Service attack vectors.
Read ResearchGoogle Translate Sandbox Breakout
Identified critical vulnerabilities allowing a sandbox breakout within Google Translate’s infrastructure.
Read ResearchGoogle Glass & AR/VR 0-days
Explored deep attack surfaces in Google Glass and early AR/VR hardware, disclosing DoS and XSS vulnerabilities to the Glass team.
Malicious Mobile Power Stations
Demonstrated novel attack vectors exploiting public USB charging stations to compromise smartphones via hidden hardware.
Read ResearchFiresale Botnet Analysis
Conducted a comprehensive evaluation of the Firesale botnet panel to uncover exploitable flaws in the threat actor's infrastructure.
Read ResearchCloud9 IDE Remote Code Execution
Discovered unpatched XSS and potential Remote Code Execution vulnerabilities within the Cloud9 online development environment.
Read ResearchCarberp Botnet Cryptography
Reverse-engineered the Carberp banking trojan, discovering critical vulnerabilities and broken cryptographic implementations in the C2.
Read ResearchWikipedia Core XSS
Analyzed MediaWiki infrastructure and disclosed a Cross-Site Scripting vulnerability (CVE-2015-6729).
View CVECNN Digital Infrastructure XSS
Brought critical Cross-Site Scripting vulnerabilities in CNN's digital infrastructure to light for prompt resolution.
Read ResearchBuilding Security In Maturity Model
Contributed to the BSIMM program, building and improving software security maturity benchmarks for enterprise organizations.
View BSIMMISC2 Bug Bounty & External Scrutiny
Presented on the strategic importance of external scrutiny and bug bounty programs to enhance institutional security postures.
View PresentationBlack Energy Botnet Neutralization
Analyzed the Black Energy botnet C2 infrastructure to identify exploitable vulnerabilities and safely neutralize the threat.
Read ResearchApache Batik DoS Vulnerability
Discovered a Denial-of-Service vulnerability (BATIK-1023) within the Apache Batik SVG toolkit, enabling rapid mitigation.
View AdvisoryPrivate R&D
Stealth-mode initiatives in systems-inspired defense, autonomous architectures, ZK/MPC, and cryptographic protocol resilience.
