Winning streak & team building

Just a humble brag and a note on team building.

Posted on: August 01, 2025 03:45 AM

View
The Federal Government's Cyber Talent Pipeline May Have Been Compromised

Given that Canadian national security agencies recruit cyber operators from CyberSci, Canada's national security training pipeline may have been compromised by financial relationships that prioritize sponsor comfort over legitimate security discourse and effective talent development.

Posted on: July 26, 2025 03:48 AM

View
Mission Cyber Sentinel was completed

Mission Cyber Sentinel is a global cybersecurity initiative focused on identifying and responsibly disclosing vulnerabilities in open-source software to protect over 446,000 online assets, including websites, servers, and IoT systems worldwide.

Posted on: July 18, 2025 08:14 PM

View
Delta Obscura website has been launched

Today, June 29th 2025, marks the launch date of Delta Obscura. Delta Obscura is the global research arm of Cyber Mounties.

Posted on: June 29, 2025 11:06 AM

View
Analyzing traffic spikes on my website

My personal website is seeing organic traffic spikes and that’s definitely a good thing. Find out why.

Posted on: June 19, 2025 09:50 PM

View
History Stealer | CyberSci June 15th 2025 | CTF Solution

Solution to History Stealer CTF challenge and an overview of my recent contributions to national cybersecurity events.

Posted on: June 17, 2025 11:27 PM

View
We Made a Cyber Army. Kinda.

We accidentally launched early. Built a training platform, started a global cyber team, dropped a dozen CVEs, and secured over 230K websites, all under 7 months without a single government contract or a budget line for coffee.

Posted on: June 17, 2025 05:13 PM

View
The Ebola Outbreak Modeling System

The development of a fictional Ebola outbreak modeling system presents a unique opportunity to explore the theoretical dynamics of a highly lethal pathogen transmitted through an unconventional vector, such as female horse flies. Ebola virus disease (EVD) is a severe hemorrhagic fever with significant public health implications, making it a compelling subject for epidemiological modeling.

Posted on: June 08, 2025 07:54 PM

View
C2 Lingo Solution | iHack CTF 2025

C2 Lingo is a challenge that focuses on malware development, programming & cryptography. The beauty of this challenge is that it's based on real world techniques used by hackers to anonymize their communications between their malware and their command & control servers (C2).

Posted on: June 03, 2025 08:03 AM

View
PS-500 Delta | Utilizing drones for aiding Law Enforcement in car pursuits

A drone to address the chaos of high-speed car chases in the United States & Canada, where police deploy helicopters, multiple patrol cars, and significant resources, creating dangerous conditions for suspects, officers, and bystanders alike.

Posted on: May 26, 2025 04:33 AM

View
CVE Hunting Methodology: This is where the training wheels come off

In this article, I’ll walk you through my CVE hunting methodology, from how I find vulnerabilities to how I go about getting them assigned official CVE IDs. If you’ve ever wondered how to go from poking around a web app to contributing to the global vulnerability database, you’re in the right place.

Posted on: May 20, 2025 02:28 AM

View
Contao’s Laughable “Bug Bounty” Program and Self-Assigned CVEs

Let’s talk about Contao’s so-called bug bounty program and their utterly farcical CVE assignment practices on GitHub. Spoiler alert: it’s a self-congratulatory echo chamber masquerading as a security initiative.

Posted on: May 04, 2025 10:28 PM

View
Introduction to Cyber Threat Intelligence Course

This article is an intro to my upcoming cyber threat intelligence course; the current article will teach you basics of threat intel and takes a sneak peak into fine-tuning LLMs vs using existing AI solutions.

Posted on: April 25, 2025 01:14 AM

View
[Update #2] Mission Cyber Sentinel

A global cybersecurity mission dedicated to securing 250K online assets globally is almost complete.

Posted on: March 10, 2025 03:44 PM

View
Digital Warhead: Dissecting TTPs of a Pro-Taliban Hacking Group

This article discusses behavioral analysis techniques specifically designed to thwart malware forensic efforts.

Posted on: January 12, 2025 06:48 PM

View
Mission Cyber Sentinel – Advancing Global Cybersecurity

Mission Cyber Sentinel is focused on securing online assets by discovering and reporting vulnerabilities in high-impact open-source applications.

Posted on: January 11, 2025 12:32 AM

View