Blog

  • 7th March 2026

Fixing DNS issues with .onion addresses

Some tools support delegation of services to a remote address, but sometimes they try to resolve DNS themselves using the local DNS resolver. The resolver would get an onion address and issue a DNS error because it doesn’t know how to resolve .onion, even if the machine itself is torified. You can use socat to create a local interface that binds a local port to an onion address, so that the tool won’t try to resolve the domain.

Read more 
  • 23rd January 2026

Enabling VPN connections for Qubes OS firewall

Services like Tailscale and reverse shells won’t work until you relax the firewall to allow them… …

Read more 
  • 14th January 2026

Creating reasonably secure remote administration for Qubes OS

This guide will help you create an authenticated service for managing Qubes OS remotely

By design it will be:

  • Encrypted
  • Authenticated (with a key)
  • Over Tor
  • Works behind NAT/CGNAT
  • No open ports required
  • Accessible from any computer with a Tor Browser / Tails / Whonix
Read more 
  • 12th January 2026

Boardlight writeup

Boardlight is a Linux box featuring a Dolibarr CMS instance vulnerable to CVE‑2023‑30253, leading to remote code execution. We will exploit this vulnerability, reuse extracted credentials to gain user access, and escalate privileges via an outdated binary vulnerable to CVE‑2022‑37706.

Read more 
  • 11th January 2026

Editorial writeup

Editorial is a Linux box that involves SSRF exploitation, internal port enumeration, git credential extraction, and privilege escalation via a GitPython vulnerability (CVE‑2023‑41040). We will discover an SSRF vulnerability in a book cover upload feature, use it to scan internal ports, retrieve API credentials, access a git repository to find production user credentials, and exploit a vulnerable sudo‑allowed Python script to gain root access.

Read more