Cybersecurity Repository & CTF Writeups
Bridging the gap between theoretical knowledge and practical, hands-on experience in IT Security, Operations, and Network Infrastructures.
What You Will Find Here
CTF Writeups
Detailed step-by-step walkthroughs and analytical breakdowns of challenges from TryHackMe and other security platforms.
Security Techniques
Documentation of offensive tools, specific vulnerabilities, and defensive concepts I am currently researching.
IT Concept Notes
Structured notes covering the fundamentals and advanced configurations of Linux, Windows, and network infrastructure.
Personal Projects
Insights into my independent development work, including exploring secure memory management with Rust.
My Technical Approach
Detailed Methodology
Every writeup includes thorough enumeration steps, exploitation methods, and privilege escalation techniques.
Root Cause Analysis
I focus not just on how to get the flags, but why a vulnerability exists to ensure a deeper understanding of the underlying security flaws.
Diverse Tech Stack
My research spans Active Directory (Kerberos/DCSync), Linux kernel modules, Docker escapes, and Web3 Smart Contract exploitation.