// security research & notes

Breaking things
carefully,
then writing
about it.

I'm Michelle — security engineer sharing pentesting research, study notes, and lessons from the field. Turning complex topics into approachable language.

CRTP · CEH · Published in Block Magnates · Guest on 她Ta Zhi Dao · Public notes on HackMD
Recent View all →
Project Glasswing: Who Gets to Hold Mythos, and Why It Matters
Anthropic gated Mythos to twelve partners. The decision behavior signals industrial unilateralism — what it means for builders and attackers in the gated era.
Article
Part 2: nmap dissected — don't blow your cover before you've even started
Going beneath the hood — how nmap really discovers hosts, what changes across subnets, and why the default "stealth" flags aren't that stealthy.
Article · Part 2
Part 1: nmap — why it's everyone's first scan
What nmap actually does, why everyone runs it first, and where depth and stealth start pulling in opposite directions.
Article · Part 1
I Updated My LinkedIn. Two Days Later, Someone Impersonated My CEO.
How phishing emails find you using LinkedIn scrapers, and how to spot them before they do — a real incident breakdown.
Article
Cybersecurity, Scammers, and Confidence
Guest on 她Ta Zhi Dao — how scammers collect your data, social engineering in Asia, and building confidence as a woman in security.
Podcast
Serendipity in Giving
Volunteering at the Women in Tech Global Summit 2025 in Osaka — how showing up and giving fully turns serendipity into something tangible.
Medium
Study Notes
Reference
CRTP Study Notes
Full AD red team kill chain — from AMSI bypass and domain enumeration to Kerberos attacks, persistence, and cross-forest trust abuse.
Cheatsheet
Exploiting Databases
SQL injection and exploitation reference for Oracle, MySQL, and PostgreSQL — from union-based extraction to RCE and WAF bypass.
Notes
Exploiting ViewState
ASP.NET deserialization to RCE via ysoserial.net — TypeConfuseDelegate and ActivitySurrogateSelector gadget chains explained.
About

Security engineer based in Taipei. I spend my days finding what's broken in systems and helping organizations understand what's actually at risk.

I write about what I break and what I learn. If something cost me hours to figure out, I write it down so it costs you minutes.

Currently: researching, breaking, documenting.
Drawing diagrams nobody asked for.

Connect