Cybersecurity Writeups
Detailed CTF solutions, forensic investigations, and security research. Learn through practical examples and step-by-step guides.
HackTheBox Machines
HTB
Complete walkthroughs of retired HTB machines with detailed enumeration, exploitation, and privilege escalation techniques.
CTF Challenges
CTF
Solutions to various CTF challenges covering web exploitation, cryptography, reverse engineering, and forensics.
Sherlock Investigations
DFIR
Digital Forensics and Incident Response investigations with detailed analysis and evidence collection.
☕ Support My Work
Creating detailed cybersecurity writeups takes time, research, and plenty of coffee.
If you find these resources helpful, consider supporting my work.
💦 Buy Me a Coffee