HackTheBox Dog Writeup | OSCP/CPTS Prep
In this walkthrough, I dive into HTB’s “Dog” , a solid beginner-to-intermediate box great for OSCP orCTPS…
In this walkthrough, I dive into HTB’s “Dog” , a solid beginner-to-intermediate box great for OSCP orCTPS…
Just getting started with web hacking? This TryHackMe lab is the perfect intro! Learn how web apps…
In HTB Sherlock: Meerkat, the objective is to analyse network traffic (PCAP) and log data to identify a system…
LLMs like ChatGPT, Gemini, and Claude are revolutionizing how we work , but they also open a…
This article provides a detailed comparison between two prominent web security certifications: Hack The Box Certified Bug Bounty Hunter (CBBH) and PortSwigger…
This article outlines various web hacking challenges from the PicoCTF platform, demonstrating practical approaches to identifying and…
In this article, I present a collection of practical programming solutions tailored to cybersecurity challenges from HackTheBox….
The article discusses a critical vulnerability, identified as CVE-2025-49113, affecting Roundcube webmail, a widely used open-source email client often integrated…
“Every second, your organization’s data is under attack. Who’s watching? The Security Operations Center (SOC), a dedicated…
This article provides a clear and concise walkthrough of the “Emdee five for life” challenge from Hack…
This article discusses a Microsoft Windows Active Directory vulnerability called “Bad Successor.” This vulnerability can allow an…
This article serves as a comprehensive guide to understanding and utilizing SQLmap, a powerful open-source tool designed…
HackTheBox Insomnia challenge comes with a link to a vulnerable website and its source code. The goal?…
Welcome to this write-up for the TryHackMe Moniker Link room. This guide will walk you through the…
HackTheBox Heal begins with reconnaissance revealing two main subdomains: a Ruby on Rails-based API and a PHP-based…
In this article, I pull back the curtain on cybersecurity and strip away the polished image many…
In this article, we covered phases of the Cyber Kill Chain as part of the cyber threat…
This article is a comprehensive walkthrough of TryHackMe’s “iOS Forensics” room, designed to help learners practice digital…
The article explains that Chrome extensions are composed of six main parts: the manifest file, background scripts,…
Introduction This guide provides a comprehensive walkthrough of the TryHackMe room “Nmap: The Basics.” It introduces beginners…