⭐ Featured
Responsible Disclosure
Zetes Hall of Fame: Vulnerability Breakdown
Detailed analysis of the logic flaw that led to a formal acknowledgment in the Zetes Security Hall of Fame. Covers the full discovery timeline, proof-of-concept, and coordinated disclosure process.
WAF Bypass
Unicode Normalization in Modern Firewalls
Exploring how edge cases in UTF-8 processing allow bypasses in enterprise WAF configurations, with reproducible examples against Cloudflare and Akamai.
⭐ Featured
AI
AI in Cybersecurity
UEBA, AI-generated phishing, LLMs in SOC, autonomous red teaming, limitations. Has stat cards, code examples, callout boxes.
Bug-Bounty
Bug Bounty Starter Guide
Platform comparison cards, 6-step methodology, essential tool stack, report writing guide. The most SEO-friendly of the three.
Bug-Bounty
OWASP Top 10 2025
Full ranked list with change indicators, prompt injection deep dive, SSRF cloud metadata attack, testing methodology updates.
More writeups coming soon
Subscribe below to get notified when new research drops.