Safetica Kernel Privilege Bypass Vulnerability (CVE-2026-0828)
Vendor has been notified. Due to no responses, we reported this to CERT and have come forth with our research. Vulnerable drivers and writeups can be foun...
Specializing in advanced reverse engineering, vulnerability research, and intelligence for high-stakes environments.
We dig deep where others stop. Our methodology combines manual analysis with custom automated tooling.
Deconstructing proprietary protocols, file formats, and compiled binaries to understand inner workings and undocumented features.
Identifying critical security flaws in software and hardware before adversaries do. We focus on high-impact zero-day discovery.
Developing bespoke implants, C2 frameworks, and evasion techniques for red teams and security assessments.
Vendor has been notified. Due to no responses, we reported this to CERT and have come forth with our research. Vulnerable drivers and writeups can be foun...
In the evolving intersection of blockchain and security tooling, ChainVeil emerges as a compelling new project. ChainVeil is built in Rust and generates cust...
Here is a sample report written during a practice run with CodeHawks Rust AMM named SSSwap. Below is a writeup of a finding discovered by KOSEC.
KOSEC participated in a code review with Cantina to audit the AquaNetwork Aquarius AMM. Below is a writeup of a finding discovered by KOSEC.
Real-time auditing tool exploring malicious IDE extension behavior.
Decentralized C2 framework exploring blockchain dead drops.
BYOVD research performed by KOSEC. Includes vulnerable drivers and writeups.
Where silence gathers its own intelligence.
We are always interested in discussing new challenges.
Secure communication channels available upon request.