Hunting C2 channels in DNS traffic
Analyzing anomalous DNS patterns to identify command-and-control infrastructure.
Observing hostile networks since [REDACTED]
We are an independent research collective focused on building resilient systems and studying real-world adversarial behavior. We publish. We observe. We document.
Offensive and defensive security research. We document methods, analyze threats, and share findings.
Explore →Experiments in building resilient systems. Mail security, identity management, access control.
Explore →Monitoring internet background noise. SSH probes, SMTP scans, web crawlers. We watch the network.
Explore →Analyzing anomalous DNS patterns to identify command-and-control infrastructure.
Implementing SPF, DKIM, and DMARC for enterprise mail security.
Patterns and insights from a month of SSH brute-force attack data.