Welcome fellow **antiquarians**! `KnifeCoat` is a new way to share some of my thoughts, collect resources for study, and post some ad-hoc data/research of questionable use.
### Times gone by
`FuzzySecurity` has been servicing 250-350k unique visitors per year on average 🤯. However, one does not always have as much time to *(1)* research content, *(2)* write content, *(3)* turn the content into HTML as one used to (it's true). For this reason `FuzzySecurity` has been archived using [GitHub Pages](https://pages.github.com/). I started `FuzzySecurity` in 2011 and I believe that, while a good portion of the content has aged beyond power of memory to recall it's usefulness, it has some historic value and some pretty damn cool research! I would also like to remember, fondly, some of the suffering I endured working on the content 💕
As such `FuzzySecurity` will remain online and accessible using the normal URL:
Let us not then pursue
By force impossible, by leave obtain’d
Unacceptable, though in Heav’n, our state
Of splendid vassalage, but rather seek
Our own good from our selves, and from our own
Live to our selves, though in this vast recess,
Free, and to none accountable, preferring
Hard liberty before the easie yoke
Of servile Pomp. Our greatness will appear
Then most conspicuous, when great things of small,
Useful of hurtful, prosperous of adverse
We can create, and in what place so e’re
Thrive under evil, and work ease out of pain
Through labour and endurance. This deep world
Of darkness do we dread?
### But what is a KnifeCoat?
This is just a small joke, Microsoft has written detections for some tools I wrote in [Sharp-Suite](https://github.com/FuzzySecurity/Sharp-Suite) and those detections are grouped under the moniker `Knifecoat.XXXXX`. The naming game is so on point.
I have been messing around with computers for a long time, I remember using `Red Hat` before it was a commercial product if that is any indication. In 2011 I started working in security. As time progressed I narrowed my interests to focus mostly on: all things Windows, endpoint post-exploitation, OS internals, systems programming and any weird research problems that caught my attention.
I have worked on all sides of the fence in our industry: hard-core util based consulting 🔥, red teaming, defence and research. For the past 4-5 years my main efforts have been in Red Teaming and threat based research. I split my time between `R&D` and `hands-on-keyboard` activities.
Currently I work as ~~a Senior Managing Security Consultant~~ an **Antiquarian** @ `IBM` on the `Adversary Services` team.
Hit me up if you have any questions or feedback.
- Twitter - [@FuzzySec](https://twitter.com/FuzzySec)
- Mastodon - [@[email protected]
- LinkedIn - [rboonen](https://www.linkedin.com/in/rboonen/)
- Email - `[email protected]
- GitHub - [FuzzySecurity](https://github.com/FuzzySecurity)
- YouTube - [fuzzysecurity](https://www.youtube.com/@fuzzysecurity)<br><br>
-----BEGIN PGP PUBLIC KEY BLOCK-----
-----END PGP PUBLIC KEY BLOCK-----