top of page
Home Page
Blog
CTF Resources
My CTF Writeups
PenTesting Tools
More
Use tab to navigate through the menu items.
Cyber Blog
Process Injection Investigation (TLS Callback)
Hack the Box - SAU
Hack the Box Critical Ops
🔍 Sherlock Scenario: Investigating a Malware Intrusion
Tampering Vulnerability Lab - Node JS
Hack the Box - Sea
Splunk for Beginners: FREE Security Lab with Botsv3 Dataset (Dashboards, Alerts & Queries!)
Pikaptchu - Hack the Box - DFIR
NeuroSync-D - Hack the Box Lab
FTP Data Exfiltration Investigation
CSRF SameSite Strict bypass via sibling domain
Exploiting CSRF: Bypassing SameSite Strict with Client-Side Redirects
Hack the Box - Investigation (Medium)
Server-Side Parameter Pollution (SSPP) Through Query Strings
Boss Of The SOC V1 Blue Team Lab
DownUnderCTF - Web - Python Prototype Pollution
UIUCTF 2024 - Fare Evasion
US Cyber Games 2024 - Certified
US Cyber Games 2024 - Ding-O-Tron
NahmaCon CTF 2024 - 1337 Malware
Splunk Incident Handling - Exploitation Detection THM series 2/7
Hack The Box Machine Write-Up: Codify
Hack the Box - Incident Response - Meerkat
Hack the Box - Forensics - Red Miners
Hack the Box - WEB - Juggling facts
Post Incident Response - I like to - Sherlock by HTB
🔐 Hack The Box Machine Write-Up: PC
Incident Handling with Splunk - THM Series - Phase 1/7 Reconnaissance
Tenable Capture the Flag - Web - Cat Viewer
Hack the Box - Precious
Hack the Box - Soccer
Hack the Box - Stocker
Docker - Analyzing Images Offline
Docker Registry Enumeration
Docker 101
Hack the Box - MetaTwo
Hack the Box - Trick
Linux Hard Disk/Drive - Reference
Hack the Box - Late
Try Hack Me - Greenbone GVM and OpenVas
Python Poetry - Packaging and dependency management made easy
Greenbone Vulnerability Management Scanner - New Notus Scanner
Hack the Box Router Space
Hack the Box - Undetected
Hack the Box - Paper
Boss of the Soc - Splunk
Tenable CTF 2022 - Forensics
Google CTF - Beginner Quest Part 1
Hack the Box - Meta
Hack the Box - Pandora
bottom of page