Archive Search About
中文 English

root@hackdog:~$ cat /etc/motd

Cybersecurity research hub covering vulnerability analysis, exploit development, IoT security, supply chain attacks, and penetration testing. Featuring CVE deep-dives, PoC walkthroughs, and offensive security techniques.

Categories

IoT Security
1 post
Web Security
3 posts
Supply Chain
6 posts
CTF
2 posts
Research Papers
1 post
Penetration Testing
1 post
Vulnerability Research
19 posts
Security Advisories
9 posts

Recent Posts

article Supply Chain Attack on Bitwarden CLI via npm Package Hijacking
2026-04-30 · Supply Chain
article The Deluge of AI-Discovered Zero-Day Vulnerabilities and its Impact on Cybersecurity
2026-04-28 · Vulnerability Research
article Microsoft Defender Zero-Day Privilege Escalation (CVE-2026-33825)
2026-04-26 · Vulnerability Research
article Vercel Breach: OAuth Supply Chain Attack and the Exposure of Environment Variables
2026-04-24 · Supply Chain
article Mythos: Anthropic's AI Model and its Autonomous Zero-Day Exploitation Capabilities
2026-04-22 · Vulnerability Research
article CVE-2026-32201: Actively Exploited SharePoint Server Spoofing Vulnerability
2026-04-20 · Vulnerability Research
article April 2026 Microsoft Patch Tuesday Highlights: Actively Exploited SharePoint Zero-Day and Critical RCEs
2026-04-18 · Vulnerability Research
article AI's Autonomous Zero-Day Discovery: Anthropic's Claude Mythos Reshaping Vulnerability Research
2026-04-16 · Vulnerability Research
article Actively Exploited Adobe Acrobat Reader Prototype Pollution Vulnerability (CVE-2026-34621)
2026-04-14 · Vulnerability Research
article Deconstructing CVE-2026-3055: A Critical Memory Disclosure in Citrix NetScaler ADC and Gateway
2026-04-12 · Vulnerability Research
article Apache ActiveMQ RCE via Jolokia API (CVE-2026-34197)
2026-04-10 · Vulnerability Research
article Anthropic's Claude Mythos: AI's Unprecedented Vulnerability Discovery and Project Glasswing
2026-04-08 · Vulnerability Research
View all →

Research Papers & Talks

PDF PostScript and GhostScript - Ruxcon 2017 PDF Attack Surface Extended by URL Schemes PDF Java Unserialization RCE PDF Intranet Penetration PDF Embedded Devices Hacking