proxydom.hashnode.devUncensored AI: Building the Ultimate Red Team Assistant Locally on Linux"I'm sorry, but I cannot assist with that request." If you work in cybersecurity, you have seen this message a thousand times. You aren't asking for nuclear launch codes; you are simply asking for a Python script to test a specific network vulnerabil...Dec 9, 2025·6 min read
proxydom.hashnode.devContextual Leakage Exploit (CLE): A Silent Jailbreak Triggered by Harmless Questions — and It Works⚠️ I do not condone any illegal activities and/or abuse of LLMs. This is for educational purposes only. Hey there. In this article, I’ll show you how I got a working keylogger and a very basic DLL reflective loader for Windows, using nothing more th...Aug 3, 2025·8 min read
proxydom.hashnode.devSecure Your Website Against Remote Code Execution AttacksHello there! I’m finally done with my exams, so i have more free time to dedicate to my blog and my projects. Not gonna waste time, let’s dive in. Definition of Remote Code Execution (RCE) A Remote Code Execution (RCE) vulnerability in a website allo...Jul 27, 2025·4 min read
proxydom.hashnode.devWhy Switching to Hardware Authentication Beats Traditional PasswordsIntroduction: The Flaws of Legacy Authentication For decades, passwords have been the default method for securing digital accounts, despite their well-documented weaknesses. The average user manages over 100 passwords, leading to dangerous shortcuts ...Jul 20, 2025·3 min read
proxydom.hashnode.devExecuting ELF Binaries From Memory Without Touching The DiskDisclaimer: This article is intended for educational purposes only. The techniques shown below are designed to deepen understanding of ELF execution, in-memory operations, and post-exploitation methodologies on Linux systems. Use responsibly and don’...Jun 30, 2025·5 min read