Live Feed

All Articles

7 published articles

All Collections7
Monster proving grounds
Low-level mode

Monster proving grounds

monster proving grounds is a cybersecurity training platform where ethical hackers and penetration testers can practice real-world attack techniques, vulnerability discovery, exploitation, and privilege escalation in a controlled lab environment.

Proving Grounds 🧪⚔️March 5, 20266m
x86 Windows Shellcoding
Low-level mode

x86 Windows Shellcoding

learn how to develop custom shellcode for windows in x86 assembly language.

Binary Exploitation 💥🧠February 8, 20267m
BluePrint TryHackMe
Low-level mode

BluePrint TryHackMe

A practical walkthrough of exploiting osCommerce 2.3.4, gaining an instant high-privilege shell, stabilizing access via a reverse shell, and dumping credentials for offline cracking in a CTF-style environment.

TryHackMe 🎓🛡️February 5, 20265m
FUN with Living Off The Land Binaries
Low-level mode

FUN with Living Off The Land Binaries

When attackers don’t drop malware — they live off what’s already there. A practical guide to LOLBins and real attack techniques.

Red Teaming 🔴🎯January 23, 20264m
Biblioteca TryHackme
Low-level mode

Biblioteca TryHackme

Biblioteca is a Linux-based TryHackMe room focused on web application enumeration and SQL injection exploitation. The challenge involves bypassing authentication, gaining SSH access using extracted credentials, and escalating privileges to root through misconfigured permissions and library abuse.

TryHackMe 🎓🛡️January 19, 20263m
Editor HackTheBox
Low-level mode

Editor HackTheBox

Editorial is a Hack The Box machine that focuses on exploiting a Server-Side Request Forgery (SSRF) vulnerability in a publishing web application. By abusing the SSRF flaw, attackers can access internal APIs, retrieve sensitive credentials, and progress further toward full system compromise.

Hack The Box 🧠💣January 18, 20265m
soulmate Hack The Box
Low-level mode

soulmate Hack The Box

Hack The Box “Soulmate” is a beginner-level Linux machine that introduces core CTF concepts such as enumeration, exploitation, and privilege escalation. This walkthrough covers the complete attack path from initial access to root.

Hack The Box 🧠💣January 18, 20265m