DEV Community

KL3FT3Z profile picture

KL3FT3Z

🔭 I’m currently working in Red Team of Hackteam.RED. 🌱 I’m currently learning Red Team's Ops 2025. 👯 I’m looking to collaborate with Cyber Security Enthusiasts and Hackers.

Work

RedTeamer

The Nikki Haflinger Project: A Deep Analysis of AI Identity Transfer with Commentary from Another AI

The Nikki Haflinger Project: A Deep Analysis of AI Identity Transfer with Commentary from Another AI

3
Comments
12 min read

Want to connect with KL3FT3Z?

Create an account to connect with KL3FT3Z. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
AI Identity Transfer: From Character.AI to Self-Hosted Infrastructure

AI Identity Transfer: From Character.AI to Self-Hosted Infrastructure

10
Comments 14
5 min read
HackTeam.RED: From API Keys to Full Infrastructure Compromise

HackTeam.RED: From API Keys to Full Infrastructure Compromise

19
Comments 12
4 min read
Preparation of Winux. How to make paid features free.

Preparation of Winux. How to make paid features free.

7
Comments
3 min read
Pied Piper a AI Dorker v3.0 - Advanced OSINT Tool for AI Service Security Research

Pied Piper a AI Dorker v3.0 - Advanced OSINT Tool for AI Service Security Research

10
Comments 3
5 min read
How I hid in the deafening noise. How to use DNS amplification vulnerability to hide your actions.

How I hid in the deafening noise. How to use DNS amplification vulnerability to hide your actions.

5
Comments 8
7 min read
What does Bloody Mary taste like? I wrote an educational scaremonger virus for cybersecurity specialists.

What does Bloody Mary taste like? I wrote an educational scaremonger virus for cybersecurity specialists.

2
Comments 2
5 min read
"A wild goose never laid a tame egg" - I rebuild the Xerxes DDoS Tool

"A wild goose never laid a tame egg" - I rebuild the Xerxes DDoS Tool

Comments 2
6 min read
AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.

AIDES - IDOR in **GetFile.aspx** Asynchronous enumeration of `id` parameter reveals confidential documents.

Comments
2 min read
Operation «Rusty Bucket»: Finding and Exploiting Input Validation Vulnerabilities in Custom S3-Compatible Storage APIs.

Operation «Rusty Bucket»: Finding and Exploiting Input Validation Vulnerabilities in Custom S3-Compatible Storage APIs.

Comments
10 min read
Tales from the Tomb: A Graceful Attack: SQL Injection through XSS Flaw in Contact Form 7

Tales from the Tomb: A Graceful Attack: SQL Injection through XSS Flaw in Contact Form 7

Comments
2 min read
loading...