Open Source & Public Labs

Public Research Efforts

Data-driven security initiatives focused on global threat signaling, vulnerability prioritization, and machine-learning driven offensive automation.

Threat Intelligence Metrics

Threat Intelligence Metrics

Continuous ingestion and analysis of global threat feeds to generate high-fidelity metrics and attribution insights. Mapping the shift from raw signal to actionable defensive signal.

Explore Metrics
Vulnerability Metrics

Vulnerability & Remediation

Automated parsing and prioritization of the US DHS National Vulnerability Database (NVD). Focused on identifying remediation efficiency and the delta between disclosure and patch saturation.

View Vuln Data
Gauntlt Attacks

Rugged SecDevOps Testing

Hardening the software lifecycle through automated attack simulation. A curated library of adapters and testing plans designed to "be mean to your code" before production deployment.

View Test Plans
Gyoithon AI

Gyoithon: AI-Driven PenTesting

A machine-learning framework designed to pass the Hacker Turing Test. Leveraging genetic algorithms and deep neural networks to automate complex offensive security workflows with human-like precision.

Commercial Access Only

Vulnerability Disclosures & Presentations

DEFCON

Open Source Fairy Dust

Presented research revealing flaws in internet infrastructure architecture and their economic and national security impacts.

View Presentation
DEFCON

Backdooring Git & Version Control

Explored cryptographic weaknesses and supply chain attacks via Git internals, demonstrating how code breaches jeopardize development pipelines.

View Presentation
37signals

Basecamp Infrastructure Analysis

Discovered and responsibly disclosed critical vulnerabilities within Basecamp and 37signals infrastructure.

View Disclosure
Apache Foundation

Apache Solr & Jetty Vulnerability

Identified a critical vulnerability (SOLR-4861) affecting Apache Jetty and Solr, coordinating a secure resolution with the Apache Foundation.

View Advisory
Security Onion

Security Onion CapMe Vulnerability

Uncovered vulnerabilities within the Security Onion CapMe interface, ensuring they were patched before adversaries could leverage them.

View Advisory
Scalr

Scalr Infrastructure SQLi

Discovered SQL injection and input validation vulnerabilities within the Scalr cloud management platform.

Read Research
Threat Research

Pandora DDoS Botnet Nullification

Investigated the command-and-control infrastructure of the Pandora botnet, revealing vulnerabilities to dismantle its operations.

Read Research
Publication

IS Administration & Architecture

Technical Editor for "Organizational, Legal, and Technological Dimensions of IS Admin," a reference work bridging IT system administration with legal considerations.

View Publication
LDAP Toolbox

LDAP Tool Box XSS

Identified Cross-Site Scripting vulnerabilities within the LDAP Tool Box self-service password application.

View Advisory
Block (Square)

Keywhiz Secret Management

Identified vulnerabilities within Block's Keywhiz secret management system regarding secret sanitation and handling.

View Pull Request
jQuery

jQuery Core XSS Vulnerability

Discovered a widespread Cross-Site Scripting vulnerability within the core jQuery library (Ticket #12254), impacting millions of deployments.

View Bug Report
Hack The Box

Hack The Box Elite Hacker

Reached the rank of Elite Hacker in competitive exploitation across Solaris, FreeBSD, Linux, and Windows environments.

View Profile
RFC Research

HTTP Cookie DoS Vulnerabilities

Analyzed anomalies in HTTP and Cookie RFC implementations to uncover novel Denial-of-Service attack vectors.

Read Research
Google

Google Translate Sandbox Breakout

Identified critical vulnerabilities allowing a sandbox breakout within Google Translate’s infrastructure.

Read Research
Google

Google Glass & AR/VR 0-days

Explored deep attack surfaces in Google Glass and early AR/VR hardware, disclosing DoS and XSS vulnerabilities to the Glass team.

Threat Research

Malicious Mobile Power Stations

Demonstrated novel attack vectors exploiting public USB charging stations to compromise smartphones via hidden hardware.

Read Research
Threat Research

Firesale Botnet Analysis

Conducted a comprehensive evaluation of the Firesale botnet panel to uncover exploitable flaws in the threat actor's infrastructure.

Read Research
Cloud9

Cloud9 IDE Remote Code Execution

Discovered unpatched XSS and potential Remote Code Execution vulnerabilities within the Cloud9 online development environment.

Read Research
Threat Research

Carberp Botnet Cryptography

Reverse-engineered the Carberp banking trojan, discovering critical vulnerabilities and broken cryptographic implementations in the C2.

Read Research
Wikipedia Foundation

Wikipedia Core XSS

Analyzed MediaWiki infrastructure and disclosed a Cross-Site Scripting vulnerability (CVE-2015-6729).

View CVE
CNN

CNN Digital Infrastructure XSS

Brought critical Cross-Site Scripting vulnerabilities in CNN's digital infrastructure to light for prompt resolution.

Read Research
BSIMM

Building Security In Maturity Model

Contributed to the BSIMM program, building and improving software security maturity benchmarks for enterprise organizations.

View BSIMM
ISC2

ISC2 Bug Bounty & External Scrutiny

Presented on the strategic importance of external scrutiny and bug bounty programs to enhance institutional security postures.

View Presentation
Threat Research

Black Energy Botnet Neutralization

Analyzed the Black Energy botnet C2 infrastructure to identify exploitable vulnerabilities and safely neutralize the threat.

Read Research
Apache Foundation

Apache Batik DoS Vulnerability

Discovered a Denial-of-Service vulnerability (BATIK-1023) within the Apache Batik SVG toolkit, enabling rapid mitigation.

View Advisory

Private R&D

Stealth-mode initiatives in systems-inspired defense, autonomous architectures, ZK/MPC, and cryptographic protocol resilience.

REDACTED RESEARCH