Winning streak & team building
Just a humble brag and a note on team building.
Posted on: August 01, 2025 03:45 AM
ViewThe Federal Government's Cyber Talent Pipeline May Have Been Compromised
Given that Canadian national security agencies recruit cyber operators from CyberSci, Canada's national security training pipeline may have been compromised by financial relationships that prioritize sponsor comfort over legitimate security discourse and effective talent development.
Posted on: July 26, 2025 03:48 AM
ViewMission Cyber Sentinel was completed
Mission Cyber Sentinel is a global cybersecurity initiative focused on identifying and responsibly disclosing vulnerabilities in open-source software to protect over 446,000 online assets, including websites, servers, and IoT systems worldwide.
Posted on: July 18, 2025 08:14 PM
ViewDelta Obscura website has been launched
Today, June 29th 2025, marks the launch date of Delta Obscura. Delta Obscura is the global research arm of Cyber Mounties.
Posted on: June 29, 2025 11:06 AM
ViewAnalyzing traffic spikes on my website
My personal website is seeing organic traffic spikes and that’s definitely a good thing. Find out why.
Posted on: June 19, 2025 09:50 PM
ViewHistory Stealer | CyberSci June 15th 2025 | CTF Solution
Solution to History Stealer CTF challenge and an overview of my recent contributions to national cybersecurity events.
Posted on: June 17, 2025 11:27 PM
ViewWe Made a Cyber Army. Kinda.
We accidentally launched early. Built a training platform, started a global cyber team, dropped a dozen CVEs, and secured over 230K websites, all under 7 months without a single government contract or a budget line for coffee.
Posted on: June 17, 2025 05:13 PM
ViewThe Ebola Outbreak Modeling System
The development of a fictional Ebola outbreak modeling system presents a unique opportunity to explore the theoretical dynamics of a highly lethal pathogen transmitted through an unconventional vector, such as female horse flies. Ebola virus disease (EVD) is a severe hemorrhagic fever with significant public health implications, making it a compelling subject for epidemiological modeling.
Posted on: June 08, 2025 07:54 PM
ViewC2 Lingo Solution | iHack CTF 2025
C2 Lingo is a challenge that focuses on malware development, programming & cryptography. The beauty of this challenge is that it's based on real world techniques used by hackers to anonymize their communications between their malware and their command & control servers (C2).
Posted on: June 03, 2025 08:03 AM
ViewPS-500 Delta | Utilizing drones for aiding Law Enforcement in car pursuits
A drone to address the chaos of high-speed car chases in the United States & Canada, where police deploy helicopters, multiple patrol cars, and significant resources, creating dangerous conditions for suspects, officers, and bystanders alike.
Posted on: May 26, 2025 04:33 AM
ViewCVE Hunting Methodology: This is where the training wheels come off
In this article, I’ll walk you through my CVE hunting methodology, from how I find vulnerabilities to how I go about getting them assigned official CVE IDs. If you’ve ever wondered how to go from poking around a web app to contributing to the global vulnerability database, you’re in the right place.
Posted on: May 20, 2025 02:28 AM
ViewContao’s Laughable “Bug Bounty” Program and Self-Assigned CVEs
Let’s talk about Contao’s so-called bug bounty program and their utterly farcical CVE assignment practices on GitHub. Spoiler alert: it’s a self-congratulatory echo chamber masquerading as a security initiative.
Posted on: May 04, 2025 10:28 PM
ViewIntroduction to Cyber Threat Intelligence Course
This article is an intro to my upcoming cyber threat intelligence course; the current article will teach you basics of threat intel and takes a sneak peak into fine-tuning LLMs vs using existing AI solutions.
Posted on: April 25, 2025 01:14 AM
View[Update #2] Mission Cyber Sentinel
A global cybersecurity mission dedicated to securing 250K online assets globally is almost complete.
Posted on: March 10, 2025 03:44 PM
ViewDigital Warhead: Dissecting TTPs of a Pro-Taliban Hacking Group
This article discusses behavioral analysis techniques specifically designed to thwart malware forensic efforts.
Posted on: January 12, 2025 06:48 PM
ViewMission Cyber Sentinel – Advancing Global Cybersecurity
Mission Cyber Sentinel is focused on securing online assets by discovering and reporting vulnerabilities in high-impact open-source applications.
Posted on: January 11, 2025 12:32 AM
View