Logo Dark Logo IERI.SH
CTRL K
    • Operator
    • The Doctrine
    • Research
      • MalDev Logs: Building a Polymorphic Engine in Go
      • Engineering Log: The Mechanical Inevitability of Buffer Overflows
    • Archives
      • Research: Boolean & Logic-Based SQL Injection
      • Research: Bypassing Modern File Upload Filters
      • Research: OS Command Injection Execution Flow
      • Research: Server-Side Request Forgery (SSRF) Mechanics
      • Reverse Engineering and Binary Exploitation
        • Assembly Basics
      • HackTheBox Machine - Cicada
      • 1 Web Applications
        • 1f File Upload Vulnerabilities
          • 1f4 - Web shell upload via extension blacklist bypass \[PortSwigger Lab]
          • 1f3 - Web shell upload via Path Traversal \[PortSwigger Lab]
          • 1f2 - Web shell upload via Content-Type restriction bypass \[Portswigger Lab]
          • 1f1 Remote Code Execution via Web Shell Upload Portswigger Lab
        • 1a Web Requests
          • 1a1 HTTP Requests
          • 1a2 Curl
        • 1b Owasp Top 10 2021
      • Learning Powershell
      • Thoughts About My Cybersec Journey
      • Raw Notes Ssrf
        • 1c1 Ssrf Against Local Interface Portswigger Lab
        • 1c2 Ssrf Against External Back End System Portswigger Lab
      • Useful Cheatsheet for Pentesting
    • Project Armory
      • Case Study: Engineering Multi-Tenant Security for a CTF Wargames Platform
      • Project: High-Fidelity Stealth Agent - Research in Evasion and C2 Telemetry
      • Project: High-Fidelity Threat Aggregation Platform (CTI Case Study)
    • Engineering Logs
      • Configuring an ELK Stack Part 1
    • Case Study: Engineering Multi-Tenant Security for a CTF Wargames Platform
    • Project: High-Fidelity Stealth Agent - Research in Evasion and C2 Telemetry
    • Project: High-Fidelity Threat Aggregation Platform (CTI Case Study)

    Project Armory

    Implementing and detailing advanced offensive capabilities and tooling to demonstrate complex techniques and operational cleverness.
    Case Study: Engineering Multi-Tenant Security for a CTF Wargames Platform
    A technical review of the Bastioni platform architecture, detailing the use of Split-SSH, user isolation, and intentional flaws for security training.
    Project: High-Fidelity Stealth Agent - Research in Evasion and C2 Telemetry
    An R&D project detailing a self-destructing, polymorphic Go-based agent designed to stress-test EDR and Blue Team detection strategies.
    Project: High-Fidelity Threat Aggregation Platform (CTI Case Study)
    A custom Threat Intelligence (CTI) aggregation platform designed to filter open-source feeds (OTX, ThreatFox) for high-relevance threats, reducing alert fatigue.
    SYSTEM ONLINE
    IERI.SH / TBILISI
    ENC: TLS 1.3 | UPTIME: 99.9%