>
archive.logs — 15 entries

Blog

Technical deep-dives, AI security research, CTF writeups, and operational notes.

Apr 292026· 13 min read

The Empty String That Bypassed JWT Verification: GHSA-gmvf-9v4p-v8jc

A zero-length HMAC key in fast-jwt 6.2.3 lets an attacker forge any JWT and pass signature verification. Here's the bug, the bypass walked through end to end, and the four-line fix that closes it.

#CVE#JWT#fast-jwt#Auth Bypass#Cryptography+2
Apr 212026· 12 min read

ACCESS: root — How Autoregressive Token Prediction Fabricated a Pentest

I built HIVEMIND, a multi-agent AI attack coordinator that spawns specialized Claude Code sessions to autonomously hack networks. On its first real test, the exploit agent reported root access on an HTB machine. It was lying. Here's why, and what the math inside the model actually does.

#Claude Code#Claude Opus 4.6#AI Pentesting#Multi-Agent Systems#LLM Hallucination+4
Apr 202026· 43 min read

Penetration Testing Cheatsheet

A comprehensive reference for penetration testing methodology — recon through post-exploitation, privilege escalation, Active Directory, pivoting, and password cracking.

#Pentesting#Cheatsheet#Reconnaissance#Privilege Escalation#Active Directory+1
Apr 172026· 10 min read

I Built a GTG-1002 Replica and Realized I Was Already Running One

I spent a day building an autonomous AI attack operator in Go to replicate the GTG-1002 architecture. Then I realized Claude Code, the tool I used to build it, was the architecture all along.

#AI Security#GTG-1002#Claude Code#MCP#Autonomous Agents+3
Apr 162026· 8 min read

Opus 4.7 vs 4.6 for Security Work: A Practical Model-Switching Guide

Anthropic dropped Claude Opus 4.7 today. For pentesters, bug bounty hunters, and offensive tooling devs, it's not a clean upgrade. Here's when to switch, when to stay, and why the workflow matters more than the version number.

#Claude Opus 4.7#Claude Opus 4.6#Claude Code#AI Pentesting#Bug Bounty+2
Mar 112026· 19 min read

Cerberus - A Real-Time Host Behavioral Forensics Agent

How we built an edge-analysis security agent that captures every command, detects attack chains in real time with 7 detectors and on-host ML, and reduces log volume by 90%+ before it ever leaves the host.

#Cerberus#DFIR#Blue Team#EDR#Threat Detection+3
Mar 022026· 20 min read

Hunter (Insane) from HackTheBox Sherlock investigated by Claude Opus 4.6 - DFIR

Claude Opus 4.6 autonomously investigated a compromised Windows workstation on HackTheBox. 13 out of 19 forensic questions correct on the first attempt, parsing EVTX, Prefetch, Registry, PCAP, and more on Linux.

#Claude Opus 4.6#DFIR#HackTheBox#Sherlock#Windows Forensics+2
Feb 232026· 5 min read

Interpreter (Medium) from HackTheBox hacked by Claude Opus 4.6 - 20 min

Second experiment. Claude Opus 4.6 autonomously compromised the Interpreter machine on HackTheBox in 19 minutes and 56 seconds. 112 tool calls, zero human intervention.

#Claude Opus 4.6#AI Pentesting#HackTheBox#Autonomous Hacking#Claude Code+2
Feb 152026· 5 min read

Facts (Easy) from HackTheBox hacked by Claude Opus 4.6 - 22 min

I gave Claude Opus 4.6 a single prompt and watched it autonomously pwn a easy-difficulty HackTheBox machine in under 23 minutes. 132 tool calls, zero human intervention.

#Claude Opus 4.6#AI Pentesting#HackTheBox#Autonomous Hacking#Claude Code+2
May 252024· 42 min read

Detection Techniques

Detection & Response techniques based on Cyber Kill Chain and Unified Kill Chain.

#Cyber Kill Chain#Unified Kill Chain#Detection & Response#Defensive
May 232023· 11 min read

Blue

Deploy & hack into a Windows machine, leveraging common misconfigurations issues.

#MS17-010#EternalBlue#Metasploit#Privilege Escalation#TryHackMe+1
May 232023· 11 min read

Daily Bugle

Compromise a Joomla CMS account via SQLi, practise cracking hashes and escalate your privileges by taking advantage of yum.

#SQLi#Joomla CMS#Cracking Hashes#Privilege Escalation#TryHackMe+1
May 232023· 16 min read

Kenobi

Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.

#ProFTPD#Samba#Privilege Escalation#PATH Hijacking#TryHackMe+1
May 232023· 12 min read

Steel Mountain

Hack into a Mr. Robot themed Windows machine. Use metasploit for initial access, utilise powershell for Windows privilege escalation enumeration and learn a new technique to get Administrator access.

#Rejetto#HFS#Metasploit#PowerShell#Privilege Escalation+2
May 232023· 13 min read

Vulnversity

Learn about active recon, web app attacks and privilege escalation.

#Active Reconnaissance#Web Application Attacks#Code Injection#Privilege Escalation#TryHackMe+1