Category Sector

Tech Weapons

Apps, tools, systems, prototypes, network instruments, publishing artifacts, markets, and software with teeth.

28 articles

Do You Want to Build a Synthesizer or Be a Synthesizer?

Kraftwerk built theirs from scratch in a DΓΌsseldorf studio and invented the future. Moroder ran his through a Moog and Giorgio'd his way into a billion disco records. The kids making beats on SP-404s in the Bronx rewired what rhythm meant. MGMT made a record that sounds like all of them having a breakdown together. None of them waited for permission. You have a laptop, a browser, and a Python runtime. You have fewer excuses than any of them.

Read Article β†’

GHOST_PROXY: The Browser Is the Terminal

The perimeter isn't a firewall anymore. It's a behavioral signature β€” the way your script touches the DOM, the timing of your API calls, the fingerprints your environment leaves before you've done anything. GHOST_PROXY is a full-stack UserScript workshop and offensive security sandbox built for the 2026 detection landscape. Neural intercepts, Shadow DOM obfuscation, AI-assisted payload hardening. The hardest vulnerabilities aren't in the code. They're in the assumptions.

Read Article β†’

Amnesia: Scrubbing the Location Data Hidden in Plain Sight

Photographers know better than most how much a single frame reveals. Not just EXIF GPS β€” the foliage species in the background, the street sign typeface, the reflection in a window, the boutique awning half out of frame. Amnesia is a VLM-powered scrubber that finds and redacts the visual identifiers your metadata strip missed. CLI for local batch processing, browser extension for live site auditing, zero-cloud mode when the asset is sensitive enough that it shouldn't leave your machine.

Read Article β†’

DuckHunter: A Tactical OS for Drone Security Research

Drones are flying computers with radios, GPS receivers, and MAVLink telemetry β€” and most of them ship with the same protocol vulnerabilities that plagued enterprise networks a decade ago. DuckHunter is a high-fidelity simulation and research platform for the full drone attack surface: RF spectrum analysis across 2.4GHz, 5.8GHz, and 900MHz, MAVLink interception and command injection, GPS spoofing detection, electronic warfare simulation, and direct SDR hardware integration via WebUSB. Research-grade tooling. Zero telemetry. Your perimeter, your problem.

Read Article β†’

When Claude Says No and Gemini Says Yes

Built a portfolio of legitimate security tools with Claude β€” IDS evasion, cellular surveillance detection, newsroom forensics, VLM adversarial attacks. Then submitted one request that crossed the line. Claude declined immediately and explained exactly why. Gave the same idea to Gemini. Five minutes later, it was built: a working APT-inspired C2 suite with jittered beaconing, real Ethereum mempool front-running infrastructure, and a social influence graph engine the code compares β€” explicitly β€” to BloodHound. The repo is public. This is what calibration looks like when it works, and what it looks like when it doesn't.

Read Article β†’

Robotics Doesn't Need a Brain to Kill You

The real threat isn't a robot that follows orders. It's a robot making probabilistic guesses ten thousand times per second with no way to tell you why. Adversarial noise, genetic exploits, and fuzzy logic manipulation β€” the attack surface nobody patched.

Read Article β†’

The Vending Machine Is the Artwork

AI can scaffold the contract, the metadata, the deployment script, and the vending machine. The real art is turning that into something public, verified, secure, and alive enough to matter.

Read Article β†’

Yesterday's News

Before AI dev, red-teaming, and terminal-native evaluation work, there was the phone room: 3 a.m. wake-ups, 300 calls a day, 2008 from the inside, and one ugly Wall Street truth that still holds. If it is public, it is late. After that, the only intelligent question is what kind of value is still left in it.

Read Article β†’

Flea Flicker NetFilter: Network Evasion Toolkit

Netfilter hooks for packet manipulation. Deep packet inspection evasion. Protocol impersonation. MAC address rotation. Red team toolkit for penetration testing on authorized networks. Evades IDS, confuses behavioral analysis, fragments payloads, hides in legitimate traffic.

Read Article β†’

ImagePayloadInjection: The Art and Science of Weaponized Images

Shot for Vogue, Rizzoli, W Magazine. Then went red team. Every RAW file, every EXIF field, every PNG chunk photographers ever uploaded was a potential attack vector. The toolkit started with parser exploits and steganography. Now it includes a full VLM adversarial framework: invisible typography, chunk injection, frequency-domain adversarial noise, and a Red-vs-Blue sanitization stress tester that proves most production pipelines don't strip what they think they strip.

Read Article β†’

Mute Tube: YouTube Ad Silencer

YouTube Premium costs $18/month. Mute Tube is free forever. The cat-and-mouse game between YouTube's ad detection and community evasion techniques has been running for years. YouTube updates detection. Extensions adapt. Users win. Open-source DOM manipulation beats server-side ad injection. This is the technical breakdown of winning.

Read Article β†’

Hidden Bastard: Mac Junk File Eliminator

macOS gets sentimental about its own residue. Hidden Bastard was built for the moment when your storage is full, the obvious files are gone, and the real problem is all the clutter the system never volunteered to mention.

Read Article β†’

The RF Attack Surface: What's Exposed, What's Ignored, and What Actually Matters in 2026

There's a layer of your life that broadcasts continuously, in every direction, and asks nothing in return. No login, no password, no acknowledgment. Your phone tells towers where it is. Your office badge talks to readers you've never seen. Your car tells the parking lot who you are. The RF spectrum was designed for convenience, not security. The adversary has arrived.

Read Article β†’

The LinkedIn Timing Bomb

LinkedIn does not just reward performance. It rewards synchronized performance. Once you notice the weekly rhythm, the site starts looking less like a professional network and more like a scheduled theater with very anxious lighting.

Read Article β†’

La Pecorina: A Quote Blocker With Other Ambitions

A browser extension that promises to clean up LinkedIn can also turn itself into a quiet witness to everything else. The useful part is not the stunt. It is the reminder that extensions sit much closer to your life than most people admit.

Read Article β†’

Balls of Steel: VXX Trading System

A volatility system is only interesting if it reduces noise instead of adding more of it. The core idea here is simple: if VXX gets too rich relative to VIX, the fade becomes worth your attention.

Read Article β†’

Tox World: Block the Rage Bait with a Giant Sun

Some days rage bounces off. Other days it sticks. Stop pretending you have infinite willpower. Build a browser extension that replaces toxic comments with a giant sun. Local keyword filter + optional AI check. No corporate wellness speak. Just: protect your peace with code.

Read Article β†’

Tit for Tat: Why Newsrooms Need Adversarial Security in March 2026

Newsrooms are intelligence targets, not brochure websites. Tit for Tat tests them like adversaries do: origin discovery, draft leakage, RSS exposure β€” and now a full forensic layer. Chain-of-custody reports with HMAC signatures. ASN profiling that tells you whether a source IP is a cloud exit node or a newsroom laptop. Canary token detection that tells you exactly what honeypots are already watching your sources.

Read Article β†’