Exploits & Vulnerability Research
Note
At this time, no public findings are available. Older or incomplete notes have been removed or archived.
Any future publications will only appear here after coordinated, responsible disclosure.
Responsible Disclosure
TTL follows a strict responsible disclosure policy:
- Vulnerabilities are first reported privately to the vendor/operator.
- Technical details, PoCs, or exploit chains are never released until:
- a fix is available, or
- disclosure is explicitly agreed upon.
- Demos, screenshots, and test data are synthetic or based on consenting infrastructure only.
Focus Areas
Our vulnerability research primarily explores:
- OSINT-driven attack surfaces
- Adversarial AI & LLM prompt injection
- Windows & Active Directory environments
- Traffic system and IoT security (simulated/lab only)
Contact
For vulnerability reports or research inquiries, contact:
📧 skull@ttl.zip (PGP available on request)