cat /blog/*

Cybersecurity articles, tutorials, and research

2026-04-22 USB Rubber DuckyRed TeamEvasionHacker gadgetsIntial Access

Weaponizing the Rubber Ducky with Adaptix C2 : Part 2

In Part 2 of the Hak5 Toolkit series, We will walktrough hor to chain together an AMSI bypass, a Constrained Language Mode bypass, and shellcode obfuscation to achieve in-memory code execution all delivered via the USB Rubber Ducky.

2026-04-19 Intial AccessRed TeamPhysical SecurityHacker gadgets

Getting Initial Access with USB Rubber Ducky + Adaptix C2

A walkthrough of USB Rubber Ducky from USB to Shell and Chaining with Adaptix C2 for Initial Access.

2026-04-12 artificial-intelligenceappsecautomationbug-bounty

Hooking Claude into Burp Suite with MCP

A walkthrough of connecting Burp Suite to Claude using the Model Context Protocol.

2025-09-23 application-securityappsecdevsecopsred-teaming

Exploiting a Banking Playground - Vulnerable Bank Application

A walkthrough of exploiting a purposely vulnerable banking application, replicating common issues encountered during real-world security assessments including SQL injection, mass assignment, JWT forgery, and business logic flaws.

2025-05-08 hak5lan-turtleinitial-accessred-teaming

Plug & Pwn Chronicles - LAN Turtle

A hands-on guide to deploying the Hak5 LAN Turtle for covert network access during Red Team engagements, covering setup, reverse SSH tunneling, and pivoting with ProxyChains.

root@blog:~# No matching posts found.

ESC