<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
      <title>Notes - HuskyHacks</title>
      <link>https://huskyhacks.io</link>
      <description>Research notes, labs, and writeups on cybersecurity, malware analysis, and red teaming.</description>
      <generator>Zola</generator>
      <language>en</language>
      <atom:link href="https://huskyhacks.io/rss.xml" rel="self" type="application/rss+xml"/>
      <lastBuildDate>Tue, 24 Mar 2026 00:00:00 +0000</lastBuildDate>
      <item>
          <title>Reverse Engineering the LiteLLM PyPI Supply Chain Credential Stealer</title>
          <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
          <author>Matt Kiely | HuskyHacks</author>
          <link>https://huskyhacks.io/posts/litellm-cred-stealer/</link>
          <guid>https://huskyhacks.io/posts/litellm-cred-stealer/</guid>
          <description xml:base="https://huskyhacks.io/posts/litellm-cred-stealer/">A deep dive into the malicious LiteLLM PyPI release - .pth hijacking, layered base64, hybrid crypto exfil, and a dead drop C2 stub.</description>
      </item>
      <item>
          <title>Measure Twice: Exploring the Evaluation of Agentic Security Detection Systems</title>
          <pubDate>Sun, 22 Mar 2026 00:00:00 +0000</pubDate>
          <author>Matt Kiely | HuskyHacks</author>
          <link>https://huskyhacks.io/posts/measure-twice-agentic-security-detection-evaluation/</link>
          <guid>https://huskyhacks.io/posts/measure-twice-agentic-security-detection-evaluation/</guid>
          <description xml:base="https://huskyhacks.io/posts/measure-twice-agentic-security-detection-evaluation/">On applying scientific skepticism and rigor to the measurement of agentic security systems.</description>
      </item>
      <item>
          <title>HelpfulDesk Walkthrough (Nahamcon 2024 CTF)</title>
          <pubDate>Tue, 28 May 2024 00:00:00 +0000</pubDate>
          <author>Matt Kiely | HuskyHacks</author>
          <link>https://huskyhacks.io/blog/helpfuldesk-walkthrough-nahamcon-2024-ctf/</link>
          <guid>https://huskyhacks.io/blog/helpfuldesk-walkthrough-nahamcon-2024-ctf/</guid>
          <description xml:base="https://huskyhacks.io/blog/helpfuldesk-walkthrough-nahamcon-2024-ctf/">Walkthrough for the HelpfulDesk web challenge from NahamCon 2024 (easy &#x2F; easy-plus), inspired by the ConnectWise ScreenConnect auth-bypass class of bugs.</description>
      </item>
      <item>
          <title>ChatGPT &amp; Malware Analysis</title>
          <pubDate>Wed, 04 Jan 2023 00:00:00 +0000</pubDate>
          <author>Matt Kiely | HuskyHacks</author>
          <link>https://huskyhacks.io/blog/chatgpt-malware-analysis/</link>
          <guid>https://huskyhacks.io/blog/chatgpt-malware-analysis/</guid>
          <description xml:base="https://huskyhacks.io/blog/chatgpt-malware-analysis/">All aboard the hype train! Next stop, JScript Malware Deobfuscation Station! I will waste no time introducing ChatGPT. The technology needs no introduction.…</description>
      </item>
      <item>
          <title>Malware Analysis Labs: Internal Network vs Host-Only</title>
          <pubDate>Mon, 12 Sep 2022 00:00:00 +0000</pubDate>
          <author>Matt Kiely | HuskyHacks</author>
          <link>https://huskyhacks.io/blog/malware-analysis-labs-internal-network-vs-host-only/</link>
          <guid>https://huskyhacks.io/blog/malware-analysis-labs-internal-network-vs-host-only/</guid>
          <description xml:base="https://huskyhacks.io/blog/malware-analysis-labs-internal-network-vs-host-only/">This is a free and open section for Practical Malware Analysis &amp;amp; Triage. The full 9+ hour course is available on TCM Security Academy for $29.99. The first 5…</description>
      </item>
      <item>
          <title>On Patching Binaries</title>
          <pubDate>Sat, 30 Jul 2022 00:00:00 +0000</pubDate>
          <author>Matt Kiely | HuskyHacks</author>
          <link>https://huskyhacks.io/posts/on-patching-binaries/</link>
          <guid>https://huskyhacks.io/posts/on-patching-binaries/</guid>
          <description xml:base="https://huskyhacks.io/posts/on-patching-binaries/">This is a free and open section of Practical Malware Analysis &amp;amp; Triage PMAT , available on TCM Security Academy: Practical Malware Analysis &amp;amp; Triage…</description>
      </item>
      <item>
          <title>MS-Interloper: On the Subject of  Malicious MSIs</title>
          <pubDate>Sat, 16 Jul 2022 00:00:00 +0000</pubDate>
          <author>Matt Kiely | HuskyHacks</author>
          <link>https://huskyhacks.io/posts/ms-interloper-malicious-msis/</link>
          <guid>https://huskyhacks.io/posts/ms-interloper-malicious-msis/</guid>
          <description xml:base="https://huskyhacks.io/posts/ms-interloper-malicious-msis/">I completed an engagement recently where I designed my threat plan around the recent rash of malicious Windows Installer Microsoft Installer, or MSI programs.…</description>
      </item>
      <item>
          <title>Red Team Infrastructure Done Right</title>
          <pubDate>Sat, 30 Apr 2022 00:00:00 +0000</pubDate>
          <author>Matt Kiely | HuskyHacks</author>
          <link>https://huskyhacks.io/blog/red-team-infrastructure-done-right/</link>
          <guid>https://huskyhacks.io/blog/red-team-infrastructure-done-right/</guid>
          <description xml:base="https://huskyhacks.io/blog/red-team-infrastructure-done-right/">Or at least done safely. 5&#x2F;18&#x2F;22 Edit: Hey there! I ended up doing a stream with Taggart on this subject . It was a good time. Check it out here:…</description>
      </item>
      <item>
          <title>COM Hijacking Creative Cloud</title>
          <pubDate>Sat, 16 Apr 2022 00:00:00 +0000</pubDate>
          <author>Matt Kiely | HuskyHacks</author>
          <link>https://huskyhacks.io/posts/com-hijacking-creative-cloud/</link>
          <guid>https://huskyhacks.io/posts/com-hijacking-creative-cloud/</guid>
          <description xml:base="https://huskyhacks.io/posts/com-hijacking-creative-cloud/">The deep magics of the Component Object Model continually amaze me. Our subject for today’s note post is COM hijacking Adobe Creative Cloud for userland…</description>
      </item>
      <item>
          <title>Failing All The Way To Token Manipulation, Part 1</title>
          <pubDate>Thu, 14 Apr 2022 00:00:00 +0000</pubDate>
          <author>Matt Kiely | HuskyHacks</author>
          <link>https://huskyhacks.io/posts/failing-all-the-way-to-token-manipulation-part-1/</link>
          <guid>https://huskyhacks.io/posts/failing-all-the-way-to-token-manipulation-part-1/</guid>
          <description xml:base="https://huskyhacks.io/posts/failing-all-the-way-to-token-manipulation-part-1/">I’ve been on a quest to add SCShell https:&#x2F;&#x2F;github.com&#x2F;Mr-Un1k0d3r&#x2F;SCShell functionality to OffensiveNotion https:&#x2F;&#x2F;github.com&#x2F;mttaggart&#x2F;OffensiveNotion .…</description>
      </item>
      <item>
          <title>DLL Hijacking Notion.exe?</title>
          <pubDate>Fri, 08 Apr 2022 00:00:00 +0000</pubDate>
          <author>Matt Kiely | HuskyHacks</author>
          <link>https://huskyhacks.io/posts/dll-hijacking-notion-exe/</link>
          <guid>https://huskyhacks.io/posts/dll-hijacking-notion-exe/</guid>
          <description xml:base="https://huskyhacks.io/posts/dll-hijacking-notion-exe/">Notion.exe loads quite a few DLLs that are not found in the default install directory of the app itself. It also loads a few that can be outright replaced…</description>
      </item>
      <item>
          <title>We Put A C2 In Your Notetaking App: OffensiveNotion</title>
          <pubDate>Sun, 27 Feb 2022 00:00:00 +0000</pubDate>
          <author>Matt Kiely | HuskyHacks</author>
          <link>https://huskyhacks.io/posts/we-put-a-c2-in-your-notetaking-app-offensivenotion/</link>
          <guid>https://huskyhacks.io/posts/we-put-a-c2-in-your-notetaking-app-offensivenotion/</guid>
          <description xml:base="https://huskyhacks.io/posts/we-put-a-c2-in-your-notetaking-app-offensivenotion/">Using the Notion developer API as a C2 platform — co-developed with mttaggart.</description>
      </item>
    </channel>
</rss>
