Initializing Livey CyberDeck...
Loading intelligence modules...
Open Intelligence status: ONLINE

Research & Security

AI-Assisted Secure Coding Pipeline: DevSecOps Integration

Embedding local AI models into the development lifecycle to catch vulnerabilities before commit-time.

AI-Assisted Security Pipelines

Applying local LLMs to assist code analysis and reverse engineering securely.

AI-Augmented Binary Diffing: LLMs in Reverse Engineering

Leveraging Large Language Models to interpret binary differences, detect suspicious functions, and accelerate reverse engineering workflows.

Container-Based HoneyLabs: Deception at Scale

Deploying high-interaction honeypots using lightweight containers to study attacker behavior and gather threat intelligence.

Containerized Malware Baselines: Defining Behavioral Ground Truth

Designing a reproducible laboratory for malware behavioral baselines using rootless Podman containers and isolated networks on Arch Linux.

Cyber Hygiene in SMEs: Beyond the Basics

Effective strategies for implementing robust cyber hygiene practices in Small and Medium Enterprises with limited resources.

Laravel Supply-Chain Defense: Protecting the PHP Ecosystem

Strategies for hardening PHP/Laravel projects against dependency confusion and trojanized packages in the Composer ecosystem.

Multi-Network Cyberdecks: Simulated C2 for Secure Malware Execution

Creating offensive network simulation scenarios using multi-network rootless containers for secure malware execution and C2 simulation.

Podman Isolated Labs

Rootless, Multi-Network Containers for Malware Analysis and Secure Research

Rootless Escape Resilience: Testing Container Isolation

An in-depth analysis of escape resilience in rootless Podman containers on Arch Linux, featuring threat modeling, stress testing, and hardening.

Secure Coding vs. GenAI Inputs: An Empirical Audit

Evaluating the security quality of code snippets generated by AI, identifying vulnerable patterns, and defining guidelines for developers.

Zero-Trust for Small Teams: Practical Implementation

A pragmatic guide to implementing Zero-Trust architecture in small engineering teams without enterprise-grade budgets.

>