The default in most "AI security" tools today is that the model runs the engagement. Battle Ready Armor takes the opposite position: the operator drives, the AI is advisory, and the framework holds the line mechanically —through approval tokens, scope checks, and on-disk anonymization that survive any model swap. Slim is the free tier, out today.
Tag: Cybersecurity
Industry Standard Penetration Testing Reports Lack Two Key Enhancements
Penetration testing has traditionally been treated as a point in time exercise centered on identifying and exploiting vulnerabilities. While severity charts and baseline reporting are standard, they often fall short in giving executives the context required for strategic decision making. This article introduces two powerful yet straightforward enhancements, remediation effort mapping and threat model context graphs. Both of these elevate reports into holistic snapshots of an organization’s security posture. By reframing deliverables in this way, penetration testing shifts from a checklist of vulnerabilities and exploits, to a source of leadership insight, enabling more informed, timely, and impactful decisions.
The quickest and simplest guide to spinning up a powerful local AI stack. Part 7 – Current Stack – Docker Deploy
Going to keep this post extremely brief. I have published the current stack and how to spin it up yourself on my GitHub. Next Part will be implementing Local Agentic RAG with Crawl4AI! Check out the repo HERE
The quickest and simplest guide to spinning up a powerful local AI stack. Part 3 – Image Generation via Stable Diffusion
So as this is the first part that integrates things that aren't included out of the box, I'm going to build these parts out separately and then at the end I'll release my full docker-compose.yml which will have all the pieces. With that in mind, lets get started. First you should go to your users … Continue reading The quickest and simplest guide to spinning up a powerful local AI stack. Part 3 – Image Generation via Stable Diffusion
PaxCounter (WiFi & Bluetooth Device Counter) For the M5Stack Core2
So I recently added Date & Time functionality to the EvilCore2 project (HERE). I also own a Lillygo LoRa32 (HERE) w/ PaxCounter firmware (HERE) but I don't care about the Lora functionality and I want to integrate it into the Evil-M5Project. First step in that was getting the functionality working which is what this post … Continue reading PaxCounter (WiFi & Bluetooth Device Counter) For the M5Stack Core2
Dumping Firmware from ESP8684
Clear instructions on how to dump firmware from an ESP8684 chipset that I couldn't find an example of anywhere outside of the docs.
ConfiguringWindows Subsystem Linux (WSL) to access USB devices.
Been a minute! Here's a quick walkthrough to setting up USB device sharing for your WSL distro. I know it's nothing fancy but I'm happy to be back to making some posts. Should be many more to come. TBH, I'm not a huge fan of WSL for daily use I prefer full VMs but a … Continue reading ConfiguringWindows Subsystem Linux (WSL) to access USB devices.
CVE-2024-32210, CVE-2024-32211, CVE-2024-32212, CVE-2024-32213 LoMag (Integrator/CE) WareHouse Management
The post discusses the discovery of multiple CVEs in LoMag WareHouse Management, including hard-coded credentials, weak hash usage, and SQL injection vulnerabilities. The author provides insights into their discovery process and highlights the insecure coding practices in the application.
Top 5 ways to harden the security and privacy of your online accounts in 2022
The current top 5 ways to harden the security and privacy of your online accounts straight from a cyber security expert!
Fields of Study Within Offensive Cyber Security 2021
Read about the fields of study within offensive cyber security 2021.







