<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>DISGRACEFULDEV</title>
    <link>https://disgracefuldev.com</link>
    <description>Offensive security, red teaming, devsecops, and development.</description>
    <language>en-us</language>
    <atom:link href="https://disgracefuldev.com/rss.xml" rel="self" type="application/rss+xml"/>
    <item>
      <title>JumbleJuice: Shellcode Encoding for Payload Development</title>
      <link>https://disgracefuldev.com/blog/jumblejuice-payload-encoder.html</link>
      <description>I built a shellcode encoder that outputs ready-to-paste code snippets in C, C#, Go, Python, Rust, and Nim. Six encoding schemes, zero dependencies. Here's how it works and why I needed it.</description>
      <pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate>
      <guid>https://disgracefuldev.com/blog/jumblejuice-payload-encoder.html</guid>
      <category>tools</category>
    </item>
    <item>
      <title>Bypassing EDR with Syscall Proxying</title>
      <link>https://disgracefuldev.com/blog/bypassing-edr-syscall-proxying.html</link>
      <description>EDR products hook ntdll.dll to watch your syscalls. Syscall proxying lets you slip past those hooks by borrowing clean stubs from modules the EDR didn't bother to patch.</description>
      <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
      <guid>https://disgracefuldev.com/blog/bypassing-edr-syscall-proxying.html</guid>
      <category>red-team</category>
    </item>
    <item>
      <title>CI/CD Pipeline Attack Surface Mapping</title>
      <link>https://disgracefuldev.com/blog/cicd-attack-surface-mapping.html</link>
      <description>Every CI/CD pipeline is an attack surface. From GitHub Actions to Jenkins, this post maps the common attack vectors and shows how to find them in your own infrastructure.</description>
      <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
      <guid>https://disgracefuldev.com/blog/cicd-attack-surface-mapping.html</guid>
      <category>devsecops</category>
    </item>
    <item>
      <title>CVE-2025-59287: Unauthenticated RCE in WSUS via Deserialization</title>
      <link>https://disgracefuldev.com/blog/wsus-rce-cve-2025-59287.html</link>
      <description>A CVSS 9.8 deserialization flaw in WSUS lets an unauthenticated attacker pop a SYSTEM shell on any unpatched WSUS server. No credentials required, just network access to port 8530.</description>
      <pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate>
      <guid>https://disgracefuldev.com/blog/wsus-rce-cve-2025-59287.html</guid>
      <category>red-team</category>
    </item>
  </channel>
</rss>