CirriusTech
  • Home
  • Tech
  • Projects
  • Personal
  • Fiction
  • About
  • Certifications
☕ Enjoying the content? Consider supporting me on Ko-fi

Projects & Research

Tools, Research & Open Source

Security research, open source tooling, and experimental projects. Built to explore, understand, and solve real problems.

🔬

OID-See

BloodHound for OAuth in Entra ID — maps third-party app consent, scopes, assignments, and trust signals into a graph to surface impersonation risk and OAuth sprawl.

GitHub
🔬

ISDF — Intune Stateful Device Fingerprinting

Cloud-stamped device metadata for Conditional Access — moves device trust out of the endpoint and into Azure, using TPM-rooted hardware identifiers validated by a Logic App with Managed Identity.

GitHub
🔬

KuShu — Attack & Defence Research

KuShuSec is a collection of cloud security attack and defence research, tools, and mind maps — including the KuShu-Atama attack/defence mind map repository and SPADE research.

GitHub
🔬

Az-Skywalker

A collection of Azure security research tools exposing control plane isolation flaws, cross-plane data exposure, and silent data harvesting in Microsoft Azure iPaaS services.

GitHub
🔬

The Audrey Project

A curated RSS/OPML feed collection for tech and security professionals — helping you stay current without drowning in noise.

GitHub
Recent Posts
ISeeMP: What Your AI System Can Actually Be Made To Do
ISeeMP: What Your AI …

We keep asking what AI systems can do. That is not the interesting question …

May 5, 2026 Read
Sculpting with Agents: From Prompting to the Agile Agentic Development Life Cycle (AADLC)
Sculpting with Agents: …

I don’t write code. I sculpt it …

May 3, 2026 Read
Copy.Fail: When the …

Copy.Fail: When the Kernel Trusts Too Much Sometimes you hit a vulnerability that isn’t just “bad”. It’s clean. Not elegant. Not pretty. But clean in the way it slices straight through assumptions we’ve quietly depended on for years. CVE-2026-31431 is one of those. The shape of the …

April 29, 2026 Read
EleMENTAL
EleMENTAL

Somewhere Over Europe Some ideas arrive fully formed. Others sort of… leak in. This one started somewhere between Beijing and Stockholm, half-rewatching Inception on a plane, half-asleep, and very much not trying to have any original thoughts. There’s a scene in that film about dream architecture. …

April 26, 2026 Read
The Model Isn't the Risk. The Harness Is (Part 3): Defending Against Runtime Abuse
The Model Isn't the Risk. …

Hero image generated by ChatGPT This is a personal blog and all content herein is my personal opinion and not that of my employer. This is Part 3 of a 3-part series. Part Title Part 1 The Leak, the Context, and the Framework Part 2 Mapping the Trust Boundaries and the Attack Tree Part 3 (this post) …

April 2, 2026 Read
The Model Isn't the Risk. The Harness Is (Part 2): Mapping the Trust Boundaries and the Attack Tree
The Model Isn't the Risk. …

Hero image generated by ChatGPT This is a personal blog and all content herein is my personal opinion and not that of my employer. This is Part 2 of a 3-part series. Part Title Part 1 The Leak, the Context, and the Framework Part 2 (this post) Mapping the Trust Boundaries and the Attack Tree Part 3 …

April 2, 2026 Read
Footer logo
© 2026 All Rights Reserved