// Field notes

From the trenches

Offensive security, AI-assisted pentesting, reverse engineering, and the uncomfortable truths we find along the way.

I hacked my own website — 13 findings from auditing siegeoffense.com
I sell AI-assisted pentesting tools. So I pointed them at my own site. Found a publicly readable license key database, directory listing exposing every API file, and 11 other findings. Here's the full assessment, the methodology, and what I fixed.
Read more
Tearing apart a RAT from a phishing email
A coworker forwarded a suspicious email attachment that got past the spam filter. Instead of deleting it, I loaded it into Ghidra MCP. What came out was a fully functional Remote Access Trojan with keylogging, screen capture, credential harvesting, and dead-drop C2 infrastructure. Full walkthrough.
Read more
16 vulnerabilities, zero scanners
Every automated scanner bounced off Cloudflare. So we stopped scanning and started asking. The WordPress REST API told us everything — usernames, plugin stack, media library, infrastructure IDs. Here's how AI-assisted manual enumeration found what traditional tools couldn't.
Read more