Archive Search About
中文 English

root@hackdog:~$ cat /etc/motd

Cybersecurity research hub covering vulnerability analysis, exploit development, IoT security, supply chain attacks, and penetration testing. Featuring CVE deep-dives, PoC walkthroughs, and offensive security techniques.

Categories

IoT Security
1 post
Web Security
3 posts
Supply Chain
4 posts
CTF
2 posts
Research Papers
1 post
Penetration Testing
1 post
Vulnerability Research
12 posts
Security Advisories
9 posts

Recent Posts

article Deconstructing CVE-2026-3055: A Critical Memory Disclosure in Citrix NetScaler ADC and Gateway
2026-04-12 · Vulnerability Research
article Apache ActiveMQ RCE via Jolokia API (CVE-2026-34197)
2026-04-10 · Vulnerability Research
article Anthropic's Claude Mythos: AI's Unprecedented Vulnerability Discovery and Project Glasswing
2026-04-08 · Vulnerability Research
article Critical Memory Overread in Citrix NetScaler ADC and Gateway (CVE-2026-3055)
2026-04-06 · Vulnerability Research
article Weaponizing Legitimate IT Tools: The Stryker Cyberattack and Microsoft Intune Exploitation
2026-04-04 · Vulnerability Research
article Emerging Threats in AI Agent Security: Prompt Injection and Beyond
2026-04-02 · Vulnerability Research
article Supply Chain Attack on AI Development Libraries: The LiteLLM Compromise
2026-03-31 · Supply Chain
article TeamPCP: A Multi-Stage Supply Chain Attack Campaign Targeting Development Tools
2026-03-29 · Supply Chain
article The Alarming Rise of Vulnerabilities in AI-Generated Code
2026-03-27 · Vulnerability Research
article State-Sponsored "Living Off The Land" Attack Wipes 200,000 Devices via Microsoft Intune
2026-03-25 · Security Advisories
article Unpacking CVE-2026-26144: Zero-Click Data Exfiltration via XSS in Excel with AI Copilot
2026-03-23 · Vulnerability Research
article Interlock Ransomware Exploits Cisco Secure Firewall Management Center Zero-Day (CVE-2026-20131) for Root Access
2026-03-20 · Vulnerability Research
View all →

Research Papers & Talks

PDF PostScript and GhostScript - Ruxcon 2017 PDF Attack Surface Extended by URL Schemes PDF Java Unserialization RCE PDF Intranet Penetration PDF Embedded Devices Hacking