
Hardening the OpenClaw AI Agent - A Practical Security Guide
Your AI assistant has access to your files, your messages, your shell. Here's how to make sure nobody else does.

Your AI assistant has access to your files, your messages, your shell. Here's how to make sure nobody else does.
Major update to leaker - from 2 to 9 sources, new search types, JSONL output, and many quality-of-life improvements.
Introducing a new tool to find and enumerate public leaks via passive sources.
My vision on describing and categorizing types of offensive security services with notes of when each category should be used.
Several considerations on market shift from classic security research to red teaming everything.
Exploring several ways to abuse NetNTLMv1 in corporate networks.

My thoughts about obtaining a bachelor's degree and my future plans.

Introducing a new tool to find and enumerate SMB shares in networks and Active Directory domains.
Alternative to scanning methods to achieve network, host and port identification. This post covers Active Directory domains and Kubernetes clusters.
Advanced topics on network, host and port identification with defense evasion, automation of the scanning and results visualization.