security research in progress... we're not malicious, we promise!

this box operated by...
                                     88                      88  88             88              88
                                     88                      ""  88             88              88
                                     88                          88             88              88
 ,adPPYb,d8   ,adPPYba,   ,adPPYba,  88   ,d8   8b,dPPYba,   88  88   ,d8       88  ,adPPYYba,  88,dPPYba,   ,adPPYba,
a8"    `Y88  a8P_____88  a8P_____88  88 ,a8"    88P'   `"8a  88  88 ,a8"        88  ""     `Y8  88P'    "8a  I8[    ""
8b       88  8PP"""""""  8PP"""""""  8888[      88       88  88  8888[          88  ,adPPPPP88  88       d8   `"Y8ba,
"8a,   ,d88  "8b,   ,aa  "8b,   ,aa  88`"Yba,   88       88  88  88`"Yba,       88  88,    ,88  88b,   ,a8"  aa    ]8I
 `"YbbdP"Y8   `"Ybbd8"'   `"Ybbd8"'  88   `Y8a  88       88  88  88   `Y8a      88  `"8bbdP"Y8  8Y"Ybbd8"'   `"YbbdP"'
aa,    ,88
 "Y8bbdP"  =========================================================================>>  <<==========
       · Offensive Security Research · Physical Penetration Testing · Endpoint Monitoring · Threat Assessment ·

samples of our work:
  • https://www.openbugbounty.org/researchers/geeknik
  • https://hackerone.com/geeknik

  • contact us:
  • https://twitter.com/geeknik
  • geeknik
    geeknik
    geeknik
    geeknik