<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Elliott.diy</title><description>A personal site for experiments in cybersecurity, reverse engineering, and whatever breaks along the way.</description><link>https://elliott.diy/</link><item><title>Lockbit Wallet Tracking</title><link>https://elliott.diy/blog/lockbit-tracking/</link><guid isPermaLink="true">https://elliott.diy/blog/lockbit-tracking/</guid><description>Scanned 62k Bitcoin addresses from the LockBit ransomware leak to see which wallets were funded. Here’s what I found.</description><pubDate>Mon, 05 May 2025 00:00:00 GMT</pubDate></item><item><title>When WebSockets Lead to RCE in CurseForge</title><link>https://elliott.diy/blog/curseforge/</link><guid isPermaLink="true">https://elliott.diy/blog/curseforge/</guid><description>An unauthenticated local WebSocket server in the CurseForge launcher allowed any website to trigger remote code execution via attacker-controlled JVM arguments.</description><pubDate>Tue, 23 Dec 2025 00:00:00 GMT</pubDate></item><item><title>Supershy: Remote Code Execution in a VPN Client</title><link>https://elliott.diy/blog/supershy/</link><guid isPermaLink="true">https://elliott.diy/blog/supershy/</guid><description>How I found a RCE vulnerability in a privacy VPN.</description><pubDate>Sun, 06 Jul 2025 00:00:00 GMT</pubDate></item></channel></rss>