2026
March
- ret2system’s Fundamentals of Browser Exploitation
sec-research - Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
- RIP RegPwn - MDSec
- AI Red Teaming on a Budget: Getting Started
redai - Introducing Armadin With Kevin Mandia
red - Time to TryHarder again? Offsec’s new AI-300: Advanced AI Red Teaming course 🚀
- Adversarial Misuse of Generative AI
- Accelerating Offensive R&D with Large Language Models
- Living Off the LLM: How LLMs Will Change Adversary Tactics
- Needle in the haystack: LLMs for vulnerability research
vuln-researchai - AI is Eating Security What does our field look like in five years?
ai - Thinking with the Machine: How LLMs Change the Way We Build Offensive Capabilities
redai - Inside AWS Security Agent: A multi-agent architecture for automated penetration testing | Amazon Web Services
cloud - claude skills
ai - Antropic red: Reverse engineering Claude’s CVE-2026-2796 exploit
redai - Antropic.red: Partnering with Mozilla to improve Firefox’s security
redai - High-Scale Driver Vulnerability Research with Agent Swarms
windowsred - redStack: A Boot-to-Breach Lab Environment for Red Team Operators
labred - Total Recall – Retracing Your Steps Back to NT AUTHORITY\SYSTEM
windowsred - build and run a virtual iPhone on Apple Silicon Macs using the VPHONE600AP component from Apple’s Private Cloud Compute (PCC) firmware.
iOS
February
- Hacking nostalgika - Team TESO: TESO-CVS
hacking - RIP Felix “FX” Lindner. On the shoulders of giants.
legend
January
- CloudGoat 2.0 — A New AWS Security Training Tool from Rhino
cloudaws - Practical Guide to RFID Badge Copying
redhardware
---- snip ----