Every technique in this registry was discovered or significantly extended by a CredShields engagement, then verified across multiple targets. The goal is a shared artifact the security community can reference. Not just a marketing page.
// real entries will replace these placeholders · structure is production-ready
How to submit a finding
This registry is ours, but we credit external researchers who extend a technique with public analysis or a PoC. If you've built on a CS-ID entry and have something to add, email [email protected].