Security Research & Articles

2026


Detecting Bots By Analyzing Their HTTP Requests
Detecting Bots By Analyzing Their HTTP Requests
By Bob and Rutger on 26 Jan 2026
In the first deep dive of this blog series, we want first want to explore how bots behave and what steps we can take to...
Behind the Scenes of Advanced Adversary in The Middle Techniques
Behind the Scenes of Advanced Adversary in The Middle Techniques
By Bob and Rutger on 20 Jan 2026
Phishing remains a very relevant attack vector used in the wild. Up to 60% of initial access methods rely on phishing, as recently published by...
Using valid ancillary chunks to smuggle data to an endpoint
Using valid ancillary chunks to smuggle data to an endpoint
By Rutger and Bob on 05 Jan 2026
A while back we did some research into using custom ancillary chunks to hide arbitrary data in PNG images. In short, it works well for...

2025


Ancillary chunks are a perfect place to stock away sensitive info
Ancillary chunks are a perfect place to stock away sensitive info
By Rutger on 21 Nov 2025
At last, it is time for part three of “Hiding Data In Plain Sight”! Previously, I’ve written about:
Advanced Silent Python Path Hijacking
Advanced Silent Python Path Hijacking
By Rutger on 14 Oct 2025
Back in march I did some research into (silent) Python path hijacking. As a proof of concept, I created a small implementation of datetime which...
Bypassing SSRF Filters Using A Dynamic Subdomain Powered Gateway
Bypassing SSRF Filters Using A Dynamic Subdomain Powered Gateway
By Rutger on 12 Sep 2025
Sometimes when testing a web application, you may get pretty confident about a possible SSRF vulnerability. Just to recap what this entails:
Locking A Reverse Shell With A Certificate-based Challenge
Locking A Reverse Shell With A Certificate-based Challenge
By Rutger on 31 Jul 2025
As you may conclude from my post history, I like playing around with reverse shells. Lately, something has been bothering me though: why don’t I...
Standalone Python Proof of Concept Exploits
Standalone Python Proof of Concept Exploits
By Rutger on 08 Jun 2025
Lately I’ve been playing around with fully standalone, zero-to-hero proof of concept exploits in Python. To demonstrate this concept I’ve created a simple vulnerable PHP...
Automating Metasploit Setup For Practice Boxes
Automating Metasploit Setup For Practice Boxes
By Rutger on 07 May 2025
While experimenting with labs on platforms like OffSec, THM or HTB I kept doing the same repetitive setup with Metasploit. Generating payloads, setting up handlers,...
Controlling XSS Using A Secure WebSocket CLI
Controlling XSS Using A Secure WebSocket CLI
By Rutger on 07 Apr 2025
When experimenting with Cross-Site Scripting (XSS), what’s the quickest way to test multiple payloads efficiently? Not long ago, I set up an XSS server that...
Vanilla PowerShell Reverse Shell Using SMTP
Vanilla PowerShell Reverse Shell Using SMTP
By Rutger on 30 Mar 2025
Lately, as you may have noticed, I’ve been delving into the world of custom PowerShell reverse shells. I’ve been challenging myself to create tools that...
Vanilla PowerShell Reverse Shell Using ICMP
Vanilla PowerShell Reverse Shell Using ICMP
By Rutger on 20 Mar 2025
After recently creating a PowerShell reverse shell using WebSockets, I figured I could push this subject a bit further. Messing around with packets, hiding data...
Silent Python Path Hijacking
Silent Python Path Hijacking
By Rutger on 19 Mar 2025
Python’s import system allows for the possibility of intercepting the loading process of a module, which can result in unintended code execution. Within the context...
Building A Pattern-based XSS Recon Tool
Building A Pattern-based XSS Recon Tool
By Rutger on 17 Mar 2025
Even with excellent tools available, I often find myself enjoying the process of building my own (simplified) alternatives. There are several good reasons to consider...
Using LSB To Hide Data In My Socks
Using LSB To Hide Data In My Socks
By Rutger on 01 Mar 2025
Well, that’s a bit of a weird title, maybe it needs some context. In this second part of my multi-part post, I’m exploring more steganography....
Visualizing XSS With Unusual Payloads
Visualizing XSS With Unusual Payloads
By Rutger on 01 Mar 2025
Typically, demonstrating Cross-Site Scripting (XSS) vulnerabilities involves one of two approaches: Look, I made your site display an alert. I’ve stolen your cookies, credit card...
Python Powered XSS Server
Python Powered XSS Server
By Rutger on 23 Feb 2025
So, are you ready to mess around with Cross-Site Scripting and Python? Before we start, let me first explain what I mean with a payload...
Hiding Data In Response Headers
Hiding Data In Response Headers
By Rutger on 22 Jan 2025
In this multi-part post, I’m going to explore custom implementations of obfuscation and a bit of steganography. The objective is simple: set up a web...
Testing Ports For A Reverse Shell
Testing Ports For A Reverse Shell
By Rutger on 09 Jan 2025
Ever had that moment where you’re having a blast on a platform like HTB or THM, and you’re pretty confident you can set up a...

2024


Manual Obfuscation In PowerShell
Manual Obfuscation In PowerShell
By Rutger on 22 Dec 2024
Through Capture the Flag challenges and experimenting with AMSI, I’ve picked up a few tricks for manually tweaking scripts to bypass detection. While there are...
Crafted File Download Using Wmplayer
Crafted File Download Using Wmplayer
By Rutger on 14 Dec 2024
Recently I found a way to download crafted files with wmplayer.exe, the legacy Windows Media Player. This media player is still alive and present in...