Research & Insights

Security Research

Technical insights from security engagements.


LLM Security Part 1: Architecture, What Are You Attacking

This is a technical two-part technical series on attacking LLM implementations.

Understanding transformers, token streams, and the three-layer defense stack before you try to break them. Part 1 covers architecture; Part 2 covers what actually bypasses modern semantic defenses.

Read Article →


Enterprise EDR Evasion Techniques

Advanced red team methodologies for enterprise environments

Analysis of modern EDR bypass techniques including DLL unhooking, AMSI evasion, and manual mapping approaches tested against enterprise-grade security solutions.

Read Article →


Multi-Cloud Attack Vectors: AWS and Azure

Privilege escalation techniques across cloud platforms

Practical demonstration of cloud misconfigurations and privilege escalation paths using vulnerable cloud environments to understand real-world attack vectors.

AWS Article →
Azure Article →


AWS Cross-Account Database Access

Infrastructure security and cloud architecture

Achieving cross-account database access through VPC peering and IAM configuration for enterprise multi-account architectures.

Read Article →


Red Team Lab Environment Setup

Reproducible attack simulation infrastructure

Building stable, reproducible red team lab environments for testing attack scenarios and defensive capabilities.

Read Article →