Documenting offensive security research, red team tradecraft, and privacy analysis. All operations are authorized. All findings are disclosed responsibly.
DOJ charged ex-US intel for UAE spyware. One was ExpressVPN's CIO — revealed one day after Kape bought ExpressVPN for $936M. The adware company that now holds the keys to your traffic.
Timestamps are just metadata — and metadata is incredibly easy to manipulate. Understanding $STANDARD_INFORMATION vs $FILE_NAME and why clumsiness leaves more evidence than doing nothing.
Deleting a file doesn't make it disappear. On HDDs the data stays until overwritten. On modern SSDs with TRIM + encryption, it's usually gone for good. The real story is more nuanced.
Surveillance no longer asks "what did you do?" It asks "what will you do?" Your behavioral fingerprint predicts and pre-judges you before you've acted.

North Korean APT weaponizing fake GitHub job repos. A red team simulation of the full chain — social engineering, XOR-encrypted payloads, and silent C2 via npm postinstall.
A social engineering technique that tricks victims into pasting a disguised PowerShell command into File Explorer. No exploits. No admin rights. Just OS trust and bad habits.

Multi-stage HTA phishing simulation using only native Windows binaries. No implants, no custom executables — just mshta.exe, WScript, PowerShell, and registry persistence.
Writing mostly because I 'love' it. Research notes, techniques, and deep dives into offensive security and privacy.
Kape Technologies — formerly Crossrider adware — now owns ExpressVPN, PIA, CyberGhost, and the review sites that rank them.
$SI vs $FN attributes, nanosecond precision, double timestomping, and why the MFT sequence number exposes you anyway.
shred, cipher /w, hdparm Secure Erase, and why physical destruction is the only guarantee at high threat models.
Behavioral fingerprinting, correlation pipelines, and how opting out itself becomes a flag.
Why metadata beats content. How connection graphs expose power dynamics, leadership, and identity — even without reading a single message.
Proton, Tuta, SimpleLogin, self-hosted — every option has a different threat surface. Understanding what each actually protects.

North Korean APT job scam methodology — malicious postinstall scripts, XOR-encrypted Python reverse shells, C++ C2 listener. Full chain documented.
A ClickFix variant. Phishing page that copies a hidden PowerShell command to clipboard, disguised as a file path. Zero exploits, zero footprint until execution.

HTA → VBScript → hidden PowerShell → registry persistence. A full multi-stage attack chain using zero custom binaries. MITRE ATT&CK techniques documented.
Custom security tools built for red team operations and research. All open source. Use responsibly.
Portable hardware-software security device that intercepts executable file transfers between USB storage devices and Windows hosts. Runs a Python file watcher on a Raspberry Pi Zero WH performing static PE structure analysis and MD5 hash matching against known malware signatures, quarantining flagged .exe files before they reach the host system.
GitHub →Python-based proof-of-concept exploit for CVE-2024-9326, a high-severity SQL injection vulnerability in PHPGurukul Online Shopping Portal v2.0. Automates authentication bypass via classic comment-sequence payload injection against the admin login endpoint, with configurable target URL, port, username payload, and password through a CLI interface, enabling security professionals to confirm exploitability during assessments.
GitHub →Python-based proof-of-concept exploit for CVE-2024-39090, chaining a CSRF vulnerability with stored XSS in PHPGurukul Online Shopping Portal v2.0. Automates forged POST requests to inject persistent JavaScript payloads into user-controlled fields — executing in privileged user context upon page load, enabling session hijacking or credential theft scenarios during security assessments.
GitHub →C# console banking application implementing core account management operations against a flat-file binary store. Uses a custom polynomial hash function for O(1)-average account lookup with linear probing for collision resolution, supporting user registration, authentication, fund transfers, balance updates, and account deletion — all persisted via direct BinaryReader/BinaryWriter stream manipulation over a fixed-record-width file.
GitHub →// All tools are open source and available on GitHub
// Contributions and feedback are welcome
// Use responsibly and ethically
Penetration tester and security researcher focused on offensive operations.
Hi, I'm Engr. Arvin Rafael Legaspi (ghostwirez), an Offensive Security Enngineer currently working at Secuna. I specialize in Penetration Testing and a bit of Red Teaming.
I hold certifications such as CRTO, CPTS, CWES, CRTA, and other certifications that validate my expertise in the field.
I am also the founder of CyberwireZ and the HackTheBox Meetup Ambassador in the Philippines, fostering collaboration and knowledge-sharing with cybersecurity enthusiasts and professionals.
All research is conducted in authorized environments or on personal lab infrastructure.
Content is published for educational and defensive awareness purposes.
> Authorized access only
> All operations are logged