Automate the 85%: Engineering Notes from an Autonomous Pentest Platform

Published on sigoverrun.com — April 2026 1. Introduction: The Operator Leverage Thesis A skilled penetration tester spends roughly 85% of their engagement time on tasks that are procedurally deterministic: running port scans, fingerprinting services, testing default credentials, crawling web applications, correlating CVEs against discovered software versions. The remaining 15% — lateral…

The Silent Threat: Why MCP Attacks Are Reshaping AI Security

“With great power comes great responsibility.” — Stan Lee Modern AI developers love how the Model Context Protocol (MCP) lets large language models like Anthropic’s Claude, Cursor and other agentic AI tools talk to local files, APIs and databases as easily as plugging in a USB‑C cable. Just as…

Lookups Gone Wild: The New JNDI Injection Angle in CVE-2024-20931

In Oracle's latest official January 2024 patch, a remote command execution vulnerability CVE-2024-20931 based on the WebLogic T3\IIOP protocol was fixed. This vulnerability was submitted to Oracle by the author in October 2023. In principle, it is a bypass of the CVE-2023-21839 patch, which involves a new…

Gopher in the Machine: Outfoxing EDR with Go-Powered Sleight of Hand

TL;DR We walk through three low-level tricks—dynamic syscalls, Phantom DLL hollowing, and RW→RX direct execution—and show how layering them confuses most Endpoint Detection & Response platforms. All examples are in Go so you can adapt them quickly. GitHub - nullcult/GoGotBackContribute to nullcult/GoGotBack development by…