The Claude Source Code Leak
Anatomy of an AI Supply Chain Failure
Advanced cybersecurity research, red team documentation, and threat intelligence reports. Built for security researchers, by security researchers.
Top intelligence reports and security analysis
Anatomy of an AI Supply Chain Failure

Learn to execute lateral movement with Pass-the-Hash using real techniques and tools in a step-by-step educational tutorial.
Explore our structured intelligence archive
Recent cyber intelligence publications
Anatomy of an AI Supply Chain Failure

Learn to execute lateral movement with Pass-the-Hash using real techniques and tools in a step-by-step educational tutorial.

Hands-on guide to identifying and exploiting SUID binaries for privilege escalation on Linux systems, featuring GTFOBins techniques and custom exploitation paths.

Comprehensive guide to enumerating Active Directory environments using BloodHound, SharpHound collectors, and custom Cypher queries to identify attack paths from initial foothold to Domain Admin.

Step-by-step guide to deploying the Sliver C2 framework in an isolated lab environment, including implant generation, listener configuration, and post-exploitation workflows.

Analysis of advanced persistent threat campaigns targeting financial institutions across West Africa, documenting TTPs, IOCs, and recommended detection strategies.