Recon
Automated attack surface discovery — map targets fast, find weaknesses before adversaries do.
Async port scanner: CVE sigs, fingerprints, passive recon (Shodan), QUIC, Nmap pipe, script hooks — HTML / Nmap XML / Nuclei JSON.
Throughput and timing profiles for authorized scopes; audit logging and machine-readable exports.
Default-cred scanner across 8 protocols with NVD + KEV enrichment, FastAPI REST, SIEM export, notifications.
Weak logins plus CVE context for triage; async mode for faster sweeps.
Subdomain takeover + takeover-style risks: 40+ provider fingerprints, CT/DNS/RDAP, DoH, second-order CNAME chains.
Discovery → verification before dangling assets get claimed.
OSINT + dark-web pipeline: Tor/clearnet ingest, Neo4j graph, STIX 2.1, NL → Cypher — attribution-first.
Hunters + crypto tracing + stealer logs on a FastAPI + Next.js stack.
Exploitation
Targeted vulnerability exploitation — CVE-informed, adaptive, and WAF-aware.
JWT toolkit: 15+ checks, large wordlist cracking, CVE-specific chains (alg confusion, kid/JKU/X5U, null sig, JWKS spoofing).
One audit path from secret testing to forged tokens and exploit validation.
SQLi scanner: WAF-aware YAMLs, Trickest CVE sync, SARIF/JSONL for CI — GraphQL, OOB, second-order modes.
Batch URLs + CI exit codes; optional payload learning from failures.
Detection
Passive security scanning — identify misconfigurations, exposed secrets, and emerging threats without triggering alerts.
Repo deep scan: React2Shell, ML/pickle abuse, LLM exposure, GlassWorm Unicode, cloud/CI secrets — 100+ patterns + MCP server.
Targets classes typical SAST skips; tuned for lower noise.
MV3 extension: storage, WebSockets, SW caches, GraphQL — 157 patterns, ML classification, live secret verification.
In-browser surface other scanners rarely touch.
Header auditor: 60+ checks, large fingerprint set, KEV linkage, OWASP/PCI/SOC mapping, drift history, MCP remediation hints.
Letter grades + CVE tie-in; SARIF for GitHub Code Scanning.
REST + GraphQL tester: OWASP API Top 10 (2023) checks, CVE-sourced payloads, SARIF, dashboard, Docker.
Single async pass for SSRF, BOLA, auth, GraphQL, rate limits — CI-ready.
Defensive
Blue-team tooling — PCAP forensics, Windows log analysis, browser phishing defense, and behavioral privacy — without trading away operator control or data sovereignty.
Run live or on PCAP: eBPF flow + PID/binary tie-in, 25+ detectors — HTML (multi-tab), JSON, CLI, SARIF 2.1.0.
Timelines, IOC extraction, MITRE-mapped output for IR handoff.
Browser EVTX: Hayabusa, Chainsaw, or raw logs — 31 Sigma rules, PowerShell decode, 12 tabs, KQL/SPL/EQL/VQL export, no backend.
Logs stay local; heatmaps, lineage, and LOLBin radar for LotL-style cases.
MV3 + Python CLI: additive scoring, YARA-X on .eml/.msg, intel sync — NIST/MITRE-aligned triage.
Canvas LURE for live severity across the kill chain.
MV3 anti–behavioral biometrics: 22 modules (keys, pointer, motion, timing noise) — React 18 + TS; nothing leaves the browser.
Three privacy levels; sub-2ms overhead target.