by Rick Tortorella | Mar 3, 2026 | AI, Technology
Week 1: March 3 – Act I (The Crisis) March 5 Week 2: March 10 March 12 Week 3: March 17 March 19 This series documents my journey from dismissing AI as “poorly regurgitating linked letters” to building my practice around it. What I found isn’t...
by Rick Tortorella | Mar 3, 2026 | AI, Technology
Scene 1 (The Introduction) My first introduction to XBOW was a LinkedIn notification in late 2024. We’re hiring at XBOW! We’re on a mission to redefine offensive security through AI. The email was a LinkedIn summary. A repost from Nico Waisman. The...
by TJ Toterhi | Feb 5, 2026 | Offensive Operations, Technology
In Part 1 and Part 2, we covered the fundamentals and intermediate techniques. Now we’ll explore curl’s automation capabilities through globbing, handling various authentication schemes, and learn techniques for bypassing common restrictions. These skills...
by TJ Toterhi | Jan 29, 2026 | Offensive Operations, Technology
In Part 1 of our series of curl usage, we covered the fundamentals: headers, request methods, and basic data submission. Now we’ll look at some techniques that’ll make you look like a curl pro. We’ll be covering cookies, SSL certificate handling, and...
by TJ Toterhi | Jan 22, 2026 | Offensive Operations, Technology
If you’re new to penetration testing, curl might seem like just another command line tool in an already overwhelming toolkit. But here’s the thing: curl is likely the most universally available HTTP client you’ll encounter. Whether you’ve just...
by Jon Gorenflo | Aug 11, 2025 | Offensive Operations, Technology
TL;DR When buying computers for our consultants, we try not to skimp. I’ve never heard someone seriously say, “Oof. This computer is way too fast and way too powerful.” In fact, it’s usually the opposite. Fast systems mean less waiting, more...