Open Research

Security research, written for defenders.

Threat models. Detection queries. Conditional Access policies. Playbooks. Built by people who study how attackers operate — published for the people defending against them. No paywall, no email gate.

1 research bundle 6 published artifacts

Research bundles

Recently added

Why we publish this

We work both sides of security. The same understanding that builds offensive tooling also writes detections that catch it. Closed defensive content gets cited zero times; open content gets adopted, audited, improved.

Everything here is free to read, copy, and adapt. If you need help deploying any of it in your environment — tuning detections, rolling out Conditional Access, designing IR for AiTM — we offer that too.