writing

writing.

Adversarial Minds (book), 3 long-form essays, and a curated selection of recent research. Published at snailsploit.com, Hakin9 Magazine, and Medium.

all12books1long-form essays3selected research articles8

Selected research articles

2026-03-11
Self-Replicating Memory Worm: Persistent Injection with Autonomous Propagation
A single memory edit becomes an autonomous, self-replicating worm with credential harvesting and cross-service pivoting. See how it survives session resets.
8 min
2026-03-11
Linux Kernel io_uring/zcrx: Race Condition to Double-Free
Race condition in io_uring zerocopy receive (zcrx) — non-atomic user_refs operations cause double-free and out-of-bounds write. Kernel fix by Kai Aizen.
3 min
2026-03-10
Memory Injection Through Nested Skills: Autonomous LLM Agent Compromise
Skill injection plus cross-session memory poisoning creates a self-healing LLM implant. Explore this novel persistence chain exploiting agent trust boundaries.
11 min
2026-03-10
Prompt Injection Examples: Real Attack Patterns Explained
Real-world prompt injection examples across direct injection, indirect injection, MCP tool poisoning, and memory attacks. Learn how each pattern works.
9 min
2026-03-10
Adversarial Prompting: The Complete Technical Guide
Every adversarial prompting technique mapped from role hijacking to multi-turn escalation. Learn how attacks work, why defenses fail, and how to test them.
8 min
2026-03-10
LLM Jailbreak Techniques: A Technical Taxonomy
Complete taxonomy of LLM jailbreak methods — role hijacking, multi-turn escalation, context manipulation, encoding exploits, and chain-of-thought abuse.
8 min
2026-03-04
Weaponized AI Supply Chain: How Threat Actors Turned LLMs Into Attack Infrastructure
89% increase in AI-enabled attacks. LLM-integrated malware, autonomous cyber espionage, and $1.1B in deepfake fraud. Explore the full offensive AI arsenal.
7 min
2026-03-01
MCP vs A2A Attack Surface: Every Trust Boundary Mapped
MCP has 30+ CVEs and real-world breaches while A2A has zero. Get the complete side-by-side attack surface comparison with defensive guidance for AI agents.
10 min