cd ../blog
M

Matthew Keeley

15 articles

About

Founder of ProDefense and veteran security expert with over a decade of experience in offensive security. Recognized penetration testing specialist who has uncovered critical vulnerabilities in Fortune 500 companies, cloud infrastructure, and enterprise applications. Expert in red team operations, cloud security, and vulnerability research with a track record of responsible disclosures and high-impact security findings.

Articles by Matthew Keeley

Red Team

Expanding React2Shell for Serverless Lambda Functions

Existing scanners miss CVE-2025-55182 in serverless Lambda deployments. While traditional RCE is blocked by Webpack bundling, the vulnerability enables Server Side JavaScript Injection (SSJI) that can exfiltrate AWS credentials, often more dangerous than shell access in cloud environments.

Jan 26, 2026·11 min read
Red Team

The GCP Service Account That Could Read Everything

A short story about Artifact Registry reader access, container images, and why build history quietly leaks secrets.

Dec 20, 2025·3 min read
Red Team

Hawk: Automated Credential Harvesting in WRCCDC

How a tiny ptrace bird turned into a credential avalanche. The story of building Hawk, a lightweight Golang tool that silently intercepts SSH and sudo credentials in real time, and why it dominates in competitive red team exercises.

Nov 23, 2025·7 min read
Red Team

The Anatomy of a Phishing Landing Page

A research-driven look into how attackers construct phishing landing pages that mimic Microsoft federated login portals, and what defenders can do about it.

Sep 27, 2025·8 min read
Engineering

Redshift Authentication is a UX Dumpster Fire

Redshift authentication sounds simple until you try to make it secure and usable at scale. This post dives into the broken state of IAM, in-database users, and the messy tradeoffs data and platform teams face daily.

Jul 13, 2025·15 min read
Red Teaming

Machine Learning Evasion Attacks: How Adversaries Trick AI Models

How adversaries trick ML models: white-box, gray-box, black-box, and transfer-based evasion attacks, with examples and code.

Mar 17, 2025·12 min read
Vulnerability Research

ZBT WE1626 Wireless Router CVE Disclosures (CVE-2022-45551)

A detailed analysis of three critical vulnerabilities discovered in the ZBT WE1626 Wireless Router, including unauthenticated remote code execution, insufficient debug interface protection, and UART interface vulnerabilities.

Jun 30, 2024·12 min read
Application Security

Building an AppSec Program: Part 1 of a 4-Part Series on Application Security

A comprehensive guide to building an application security program from the ground up, covering team structure, roles, metrics, KPIs, and best practices for scaling security with your organization.

Jun 16, 2024·12 min read
Red Team

Hawk's Prey: Snatching SSH Credentials

Introducing Hawk, a Golang tool for monitoring /proc to capture SSH, SU, Sudo, and Passwd credentials on Linux systems in real-time, designed for red team operations and network privilege escalation.

Apr 26, 2024·5 min read
Engineering

Accessing Hundreds of RDS Databases with AD Credentials Using Python and JDBC

A guide to accessing hundreds of RDS databases at scale using Python, JDBC, and Active Directory credentials, with practical code examples and solutions.

Mar 20, 2024·4 min read
Application Security

NIST Cybersecurity Framework 2.0: Updates and How To Prepare

Exploring the key updates in NIST CSF 2.0, including supply chain security, emerging technology risks, governance tiers, and enhanced risk management communication.

Feb 29, 2024·5 min read
Red Team

Hacking Android Apps With Frida

A practical guide to using Frida for dynamic analysis of Android applications, including how to intercept and extract AWS credentials from mobile apps.

Feb 27, 2024·4 min read
Vulnerability Research

Little Bug, Big Impact: $25K Bounty

How I discovered hardcoded Stripe API keys in JavaScript source maps, leading to a $25,000 bug bounty and critical security improvements.

Jan 15, 2024·4 min read
Red Team

So You Found Auth0 Secrets, Now What?

A guide to exploiting Auth0 credentials discovered through LFI vulnerabilities, from generating JWT tokens to compromising Azure AD connections and escalating access.

Dec 19, 2023·9 min read
Engineering

Hacking SEO: Getting to the Top with AI-Generated Content

Learn how to leverage AI-generated content with GPT-4 and WordPress API to boost SEO rankings and drive traffic to your website through automated content creation.

Aug 6, 2023·5 min read