Home
The Philosophy of a Seeker
To stay Half-PWNED is to remain like a student.
Welcome to my central repository for security research and machine writeups. This site is divided into core technical playbooks and a blog of some HackTheBox labs I've pwned, my projects.
Check my website out - here.
Methodology and Playbooks 📚
These are living documents containing commands, bypasses, and checklists for specific environments.
Network Pentesting – Local PrivEsc, Kernel Exploits, Pivoting, File Transfers, more.
Web Application Pentesting – LFI, Code Injection, CMS, Web Enumeration, more.
Active Directory – Kerberoasting, BloodHound analysis, and Domain Admin pathways, more.
Upcoming... C2, Evasion, Purple Teaming, Cloud Security, AI Red Teaming
🚩 HackTheBox Blog (WIP):
My writeups are my notes, and are intentionally concise. If you are following along, stop and ask: Why did we choose this port? What did that error message actually imply? My goal is to develop the "WHY?..." and not just copy-paste.
This documentation is generated as I progress through various certifications and platforms.
Tools Used: Nmap, BurpSuite, Metasploit, Impacket, and custom Python scripts.
Goal: To document the transition from enumeration to exploitation without losing the "thread" of logic.