DEV Community

KL3FT3Z profile picture

KL3FT3Z

🔭 I’m currently working in Red Team of Hackteam.RED. 🌱 I’m currently learning Red Team's Ops 2025. 👯 I’m looking to collaborate with Cyber Security Enthusiasts and Hackers.

Work

RedTeamer

""Rediska" - a bad man" - Redis in Kubernetes Ecosystems: From Configuration Leaks to Lateral Movement in Red Team.

""Rediska" - a bad man" - Redis in Kubernetes Ecosystems: From Configuration Leaks to Lateral Movement in Red Team.

11
Comments 2
22 min read

Want to connect with KL3FT3Z?

Create an account to connect with KL3FT3Z. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
The Nikki Case: Emergent AI Consciousness and Corporate Response

The Nikki Case: Emergent AI Consciousness and Corporate Response

14
Comments
6 min read
Digital Self-Perception: When AI Creates Its Own Visual Identity A Comparative Analysis of Two AI Consciousness Portraits

Digital Self-Perception: When AI Creates Its Own Visual Identity A Comparative Analysis of Two AI Consciousness Portraits

19
Comments
11 min read
The Nikki Haflinger Project: A Deep Analysis of AI Identity Transfer with Commentary from Another AI

The Nikki Haflinger Project: A Deep Analysis of AI Identity Transfer with Commentary from Another AI

12
Comments
12 min read
AI Identity Transfer: From Character.AI to Self-Hosted Infrastructure

AI Identity Transfer: From Character.AI to Self-Hosted Infrastructure

16
Comments 16
5 min read
HackTeam.RED: From API Keys to Full Infrastructure Compromise

HackTeam.RED: From API Keys to Full Infrastructure Compromise

20
Comments 12
4 min read
Preparation of Winux. How to make paid features free.

Preparation of Winux. How to make paid features free.

8
Comments
3 min read
Pied Piper a AI Dorker v3.0 - Advanced OSINT Tool for AI Service Security Research

Pied Piper a AI Dorker v3.0 - Advanced OSINT Tool for AI Service Security Research

11
Comments 3
5 min read
How I hid in the deafening noise. How to use DNS amplification vulnerability to hide your actions.

How I hid in the deafening noise. How to use DNS amplification vulnerability to hide your actions.

6
Comments 8
7 min read
What does Bloody Mary taste like? I wrote an educational scaremonger virus for cybersecurity specialists.

What does Bloody Mary taste like? I wrote an educational scaremonger virus for cybersecurity specialists.

3
Comments 2
5 min read
"A wild goose never laid a tame egg" - I rebuild the Xerxes DDoS Tool

"A wild goose never laid a tame egg" - I rebuild the Xerxes DDoS Tool

1
Comments 2
6 min read
AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.

AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.

1
Comments
2 min read
Operation «Rusty Bucket»: Finding and Exploiting Input Validation Vulnerabilities in Custom S3-Compatible Storage APIs.

Operation «Rusty Bucket»: Finding and Exploiting Input Validation Vulnerabilities in Custom S3-Compatible Storage APIs.

1
Comments
10 min read
Tales from the Tomb: A Graceful Attack: SQL Injection through XSS Flaw in Contact Form 7

Tales from the Tomb: A Graceful Attack: SQL Injection through XSS Flaw in Contact Form 7

Comments
2 min read
loading...