Home | About | Current Focus | Blog | Upcoming Research | Backburner | Contact

📓 Blog 📓

A chronological log of research findings, technical write-ups, and experiments.

  • 🐝🔨 Building Swarnam — A Multi-Agent Red Team Swarm in Three Weeks 🔨🐝 April 07, 2026
  • 🐝🤖 Swarnam at WRCCDC Regionals — AI vs. AI in a First-of-Its-Kind Live Cyber Competition 🤖🐝 March 31, 2026
  • 🍽️ weekly-feast: When Your Spouse Breaks Your Threat Model 🍽️ March 10, 2026
  • 👻🎬 Apparition Delivery System --- WRCCDC Red Team Showcase Recap 🎬👻 March 07, 2026
  • ≋👻 Apparition Delivery System v2.0 --- From Monolithic Scripts to Minimal Command Generation 👻≋ February 03, 2026
  • ≋≋ Invisible Streams - Zero-Width Unicode Streams for NTFS Stealth ≋≋ January 28, 2026
  • 👻 Introducing Apparition Delivery System: An ADS Persistence Framework 👻 January 21, 2026
  • 📡 AudioHax: Building a Robust MFSK Audio Modem in Rust 📡 November 22, 2025
  • 🎙️ AudioHax: Reviving a 15-Year-Old Dream 🎙️ October 21, 2025
  • 📚 Physical Access, Digital Lies: Full-Stack Lock Exploitation — Phrack Submission 📚 August 19, 2025
  • 🎝️ Audit Me, I Dare You: CP2102 Spoofing and Self-Auditing Lock Failures 🎝️ August 12, 2025
  • 🔓 Ghost in the Lock: Injecting MSP430 Firmware for Undetectable Entry 🔓 August 05, 2025
  • Dead Bytes Tell No Lies: Injecting Truth into NAND Flash for Access Control Exploitation July 29, 2025
  • When Physical Meets Digital: The Early Vulnerabilities That Led to Hardware Hacking July 23, 2025

© 2025 Qweary — Security Research With Purpose

LinkedIn | Email Me