Safetica Kernel Privilege Bypass Vulnerability (CVE-2026-0828)
This vulnerability has been reported through CERT and has been assigned CVE-2026-0828. Vulnerable drivers and writeups can be found at here.
Specializing in advanced reverse engineering, vulnerability research, and intelligence for high-stakes environments.
We dig deep where others stop. Our methodology combines manual analysis with custom automated tooling.
Deconstructing proprietary protocols, file formats, and compiled binaries to understand inner workings and undocumented features.
Identifying critical security flaws in software and hardware before adversaries do. We focus on high-impact zero-day discovery.
Developing bespoke implants, C2 frameworks, and evasion techniques for red teams and security assessments.
This vulnerability has been reported through CERT and has been assigned CVE-2026-0828. Vulnerable drivers and writeups can be found at here.
In the evolving intersection of blockchain and security tooling, ChainVeil emerges as a compelling new project. ChainVeil is built in Rust and generates cust...
Here is a sample report written during a practice run with CodeHawks Rust AMM named SSSwap. Below is a writeup of a finding discovered by KOSEC.
KOSEC participated in a code review with Cantina to audit the AquaNetwork Aquarius AMM. Below is a writeup of a finding discovered by KOSEC.