Archives
All the articles I've archived.
-
Building RedTeam MCP: An AI-Powered Penetration Testing Assistant
A practical guide to building an MCP server that enables AI assistants to orchestrate offensive security tools for penetration testing, with proper safety guardrails
-
Building LangChain Tools and Agents: From Zero to SOAR Assistant
Learn how to create LangChain tools from scratch and build a simple SOAR (Security Orchestration, Automation and Response) agent. This hands-on tutorial covers the fundamentals of tool development and agent creation for security automation.
-
Building a RAG System for Cybersecurity Compliance: A Simple POC with LangChain v1+
A step-by-step walkthrough of building a basic RAG system with LangChain v1+ to query compliance regulations. This is an unoptimized POC for learning purposes, not production-ready.
-
Engineering Security ML with Elastic – Part 4: Production Pipelines with Dagster & MLflow
Transitioning from exploratory notebooks to reliable, repeatable anomaly detection pipelines using Dagster and lightweight MLflow-based model management.
-
Engineering Security ML with Elastic – Part 3: Benchmarking Unsupervised Models
How to Compare Anomaly Detection Models Without Labels
-
LangGraph Agent Architectures and Patterns: A Professional Guide
A comprehensive theoretical guide on agent architectures and patterns used professionally in AI projects. From simple workflows to hierarchical multi-agent systems, with real-world use cases for each pattern.
-
Engineering Security ML with Elastic – Part 2: Unsupervised Anomaly Detection
Learning Normal Authentication Behavior with Autoencoders
-
Engineering Security ML with Elastic – Part 1: From Logs to Features
From Windows Event Logs to Behavioral Features: Preparing Elasticsearch Data for Anomaly Detection
-
TypeScript for Pythonistas: A Guide to Building Red Team Tools
A comprehensive TypeScript guide for Python developers. Learn the fundamentals by comparing Python and TypeScript code, focused on offensive security tool development and MCP servers.
-
Model Context Protocol (MCP): Bridging the Gap Between AI and External Systems
An in-depth exploration of Model Context Protocol (MCP), the open standard revolutionizing how AI systems interact with external data sources and tools
-
Docker & Kubernetes Abuse Cheatsheet
Container escapes, docker.sock exploitation, K8s privilege escalation and misconfigurations for HTB, CTFs and cloud pentests
-
Advanced Web Hacking & Pivoting Cheatsheet
SSRF, Request Smuggling, Prototype Pollution, WAF bypass, OAuth, SAML, advanced logic flaws and internal pivoting
-
Web Exploitation Cheatsheet
SQLi, RCE, LFI/RFI, File Uploads, Deserialization, SSTI, Auth bypass and manual exploitation for HTB, CTFs and real-world pentests
-
Windows Privilege Escalation Cheatsheet
Fast techniques, tools, and commands for HTB, CTFs and OSCP-like environments
-
Linux Privilege Escalation Cheatsheet
Fast techniques, tools, and commands for HTB, CTFs and OSCP-like environments
-
SMB & RPC Enumeration Cheatsheet
Fast SMB, RPC and Windows service enumeration for HTB, CTFs and real-world AD pentests
-
Web Attack Surface & Enumeration Cheatsheet
Discovery, fingerprinting, content discovery, parameter fuzzing, virtual hosts and technology mapping for HTB, CTFs and real-world pentests
-
Active Directory PrivEsc Cheatsheet
ACL abuses, delegations, AD CS, RBCD, Shadow Credentials, and domain privilege escalation paths
-
Adversarial Machine Learning: Attacks and Defenses
Deep dive into adversarial attacks against ML models: evasion, poisoning, and extraction. Exploring defenses, red teaming strategies, and the MITRE ATLAS framework for securing AI systems.
-
Active Directory Pentesting Cheatsheet
Fast enumeration, common attack paths, and practical commands for HTB, CTFs and OSCP-like environments
-
BurpSuite Repeater/Intruder Power Tips
Advanced workflows, payload tricks, bypass techniques and hidden features for HTB, CTFs and real-world web exploitation
-
OSINT Capture-The-Flag Cheatsheet
Fast techniques, tools and workflows for social, metadata, geolocation, infrastructure and digital footprint CTF challenges
-
Vector Embeddings and Semantic Search: The Foundation of Modern AI
A comprehensive exploration of vector embeddings, from word2vec to modern transformers, and how they enable semantic search in production systems
-
Understanding LLM (Large Language Models): From Transformers to GPT
A deep dive into the architecture, mechanisms, and evolution of Large Language Models, from the Transformer breakthrough to modern GPT systems
-
Port Forwarding & Pivoting Cheatsheet
Quick notes for HTB, CTFs, tunneling, data exfiltration and exposing internal services
-
Password Attacks & Credential Hunting Cheatsheet
Bruteforce, credential harvesting, hash cracking, spraying and password reuse attacks for HTB, CTFs and real-world pentests
-
Reverse Shells & Web Shells Cheatsheet
Quick shells for HTB/CTFs: reverse shells, bind shells, web shells, upgrades and fallback techniques