📓 Blog 📓
A chronological log of research findings, technical write-ups, and experiments.
- 🐝🔨 Building Swarnam — A Multi-Agent Red Team Swarm in Three Weeks 🔨🐝 April 07, 2026
- 🐝🤖 Swarnam at WRCCDC Regionals — AI vs. AI in a First-of-Its-Kind Live Cyber Competition 🤖🐝 March 31, 2026
- 🍽️ weekly-feast: When Your Spouse Breaks Your Threat Model 🍽️ March 10, 2026
- 👻🎬 Apparition Delivery System --- WRCCDC Red Team Showcase Recap 🎬👻 March 07, 2026
- ≋👻 Apparition Delivery System v2.0 --- From Monolithic Scripts to Minimal Command Generation 👻≋ February 03, 2026
- ≋≋ Invisible Streams - Zero-Width Unicode Streams for NTFS Stealth ≋≋ January 28, 2026
- 👻 Introducing Apparition Delivery System: An ADS Persistence Framework 👻 January 21, 2026
- 📡 AudioHax: Building a Robust MFSK Audio Modem in Rust 📡 November 22, 2025
- 🎙️ AudioHax: Reviving a 15-Year-Old Dream 🎙️ October 21, 2025
- 📚 Physical Access, Digital Lies: Full-Stack Lock Exploitation — Phrack Submission 📚 August 19, 2025
- 🎝️ Audit Me, I Dare You: CP2102 Spoofing and Self-Auditing Lock Failures 🎝️ August 12, 2025
- 🔓 Ghost in the Lock: Injecting MSP430 Firmware for Undetectable Entry 🔓 August 05, 2025
- Dead Bytes Tell No Lies: Injecting Truth into NAND Flash for Access Control Exploitation July 29, 2025
- When Physical Meets Digital: The Early Vulnerabilities That Led to Hardware Hacking July 23, 2025