The default in most "AI security" tools today is that the model runs the engagement. Battle Ready Armor takes the opposite position: the operator drives, the AI is advisory, and the framework holds the line mechanically —through approval tokens, scope checks, and on-disk anonymization that survive any model swap. Slim is the free tier, out today.
Category: Cybersecurity
Addition to the $150 Private LTE Network
The first addition, a awesome 4G LTE router that runs a flavor of OpenWRT, anti-forensics blue merle plugin and supports CBRS bands (aka the $150 private LTE network). First documented case of this being supported!
Industry Standard Penetration Testing Reports Lack Two Key Enhancements
Penetration testing has traditionally been treated as a point in time exercise centered on identifying and exploiting vulnerabilities. While severity charts and baseline reporting are standard, they often fall short in giving executives the context required for strategic decision making. This article introduces two powerful yet straightforward enhancements, remediation effort mapping and threat model context graphs. Both of these elevate reports into holistic snapshots of an organization’s security posture. By reframing deliverables in this way, penetration testing shifts from a checklist of vulnerabilities and exploits, to a source of leadership insight, enabling more informed, timely, and impactful decisions.
Unbricking and Flashing the Yardstick One
Bricked your Yardstick One? This step-by-step guide shows how to recover it using its cousin, the GreatFET, by erasing, flashing, and verifying full Sub 1 GHz sniffer functionality.
The quickest and simplest guide to spinning up a powerful local AI stack. Part 7 – Current Stack – Docker Deploy
Going to keep this post extremely brief. I have published the current stack and how to spin it up yourself on my GitHub. Next Part will be implementing Local Agentic RAG with Crawl4AI! Check out the repo HERE
The quickest and simplest guide to spinning up a powerful local AI stack. Part 5 – Open-WebUI To Crawl4AI – Local Files
Implementing a Open-WebUI Function to parse user input for URLs, pass them to Crawl4AI, parse its output and save it into multiple files for later use.
The quickest and simplest guide to spinning up a powerful local AI stack. Part 3 – Image Generation via Stable Diffusion
So as this is the first part that integrates things that aren't included out of the box, I'm going to build these parts out separately and then at the end I'll release my full docker-compose.yml which will have all the pieces. With that in mind, lets get started. First you should go to your users … Continue reading The quickest and simplest guide to spinning up a powerful local AI stack. Part 3 – Image Generation via Stable Diffusion
How to generate *VALID* TLS Certificates that are *NOT* self-signed for internal only services.
Step by step instructions on how to easily use Caddy and Cloudflare to generate valid TLS certificates on the fly for services only exposed internally. No self-signing, importing CAs, cleartext HTTP, browser warnings or hassle ever again!
PaxCounter (WiFi & Bluetooth Device Counter) For the M5Stack Core2
So I recently added Date & Time functionality to the EvilCore2 project (HERE). I also own a Lillygo LoRa32 (HERE) w/ PaxCounter firmware (HERE) but I don't care about the Lora functionality and I want to integrate it into the Evil-M5Project. First step in that was getting the functionality working which is what this post … Continue reading PaxCounter (WiFi & Bluetooth Device Counter) For the M5Stack Core2
Dumping Firmware from ESP8684
Clear instructions on how to dump firmware from an ESP8684 chipset that I couldn't find an example of anywhere outside of the docs.








