Zombie Relay - Temporary relay for Reverse SSH Tunneling

An Alpine container for reverse tunneling remote services via SSH without exposing your host. Designed to die and rise again, just like a zombie.

Access SSH via Kerberos

Legit (and dirty) tricks to access a remote server via SSH when is required a Kerberos ticket.

How to craft Malicious Machine Learning models

An insight on how PyTorch malicious ML models work, how to weaponize them and the possible solutions for developers and end users to protect themselves.

HTB Blurry - Writeup

Machine learning is a relatively new field, and its security — particularly on the offensive side — offers a fascinating area for exploration.

LNK Dropper — Malware Analysis

Analysis of an Astaroth malware dropper delivered via a phishing e-mail, found while working as a SOC Analyst.