Hack The Box - Season 10 HTB Pterodactyl Writeup - Meduim - Weekly - Feb 07th, 2026
Hack The Box - Season 10 HTB Pterodactyl Writeup - Meduim - Weekly - Feb 07th, 2026
Hack The Box - Season 9 HTB Gavel Writeup - Medium - Weekly - November 29th, 2025
Hack The Box - Season 9 HTB Gavel Writeup - Medium - Weekly - November 29th, 2025
HTB Write-Up: Scepter
HTB Write-Up: Scepter
Hack The Box - HTB Voleur Writeup - Medium - Season 8 Weekly - July 5th 2025
Hack The Box - HTB Voleur Writeup - Medium - Season 8 Weekly - July 5th 2025
Hack The Box - Season 10 HTB FACTS Writeup - Easy - Weekly - January 31th, 2026
Hack The Box - Season 10 HTB FACTS Writeup - Easy - Weekly - January 31th, 2026
Hack The Box - HTB Mirage Writeup - Hard- Season 8 Weekly - July 19th,  2025
Hack The Box - HTB Mirage Writeup - Hard- Season 8 Weekly - July 19th, 2025
Hack The Box - HTB Rusty Key Writeup - Hard - Season 8 Weekly - June 28th, 2025
Hack The Box - HTB Rusty Key Writeup - Hard - Season 8 Weekly - June 28th, 2025
HTB Write-Up: Haze
HTB Write-Up: Haze
Hack The Box - Planning - May 10th
Hack The Box - Planning - May 10th
Comparing Face Swap Models: BlendSwap, Ghost, InSwapper, SimSwap, and UniFace
Comparing Face Swap Models: BlendSwap, Ghost, InSwapper, SimSwap, and UniFace
Defcon 32 Hackman CTF 2024 Packet Capture Track Write-ups
Defcon 32 Hackman CTF 2024 Packet Capture Track Write-ups
OSTH Practice Exam Write-up
OSTH Practice Exam Write-up
HTB - Operation Blackout - PWN - Power Greed
HTB - Operation Blackout - PWN - Power Greed
CVE-2024-1086 - Dirty Net table
CVE-2024-1086 - Dirty Net table
AI/ML-Driven Blue Team Operations in 2024–2025: Advancements in Malware Detection
AI/ML-Driven Blue Team Operations in 2024–2025: Advancements in Malware Detection
OffSec - vmdak
OffSec - vmdak
Web-300 - Exam 3 - June 23 2024
Web-300 - Exam 3 - June 23 2024
When WiFi Sees: The Rise of Invisible Vision
When WiFi Sees: The Rise of Invisible Vision
PDF Cracking with John the Ripper: Because Locked PDFs Are Just an Invitation
PDF Cracking with John the Ripper: Because Locked PDFs Are Just an Invitation
Integrating Quantum Computing with AI and Cybersecurity: A Quantum Pathfinding and Cryptanalysis Framework
Integrating Quantum Computing with AI and Cybersecurity: A Quantum Pathfinding and Cryptanalysis Framework
The Role of AI in Predicting Zero-Day Vulnerabilities
The Role of AI in Predicting Zero-Day Vulnerabilities
OffSec - BillyBoss
OffSec - BillyBoss
OffSec - Bunyip
OffSec - Bunyip
OffSec - PlanetExpress
OffSec - PlanetExpress
Threat Hunting Concepts and Practices - Insights from OffSec TH-200 Course module 1
Threat Hunting Concepts and Practices - Insights from OffSec TH-200 Course module 1
HTB CTF 2024 - Vault Of Hope - ICS - Shush Protocol Solution
HTB CTF 2024 - Vault Of Hope - ICS - Shush Protocol Solution
AI-Powered Malware and the Evolution of Ransomware: Implications for the Future of Cybersecurity
AI-Powered Malware and the Evolution of Ransomware: Implications for the Future of Cybersecurity
OffSec - BackupBuddy
OffSec - BackupBuddy
OffSec - Air
OffSec - Air
Machine Learning for Social Engineering Attack Detection
Machine Learning for Social Engineering Attack Detection
Threat Hunting With Network: Insights from OffSec TH-200 Course module 4
Threat Hunting With Network: Insights from OffSec TH-200 Course module 4
OffSec Module: Malware Detection using Machine Learning
OffSec Module: Malware Detection using Machine Learning
picoCTF 2021 Solution - Wireshark twoo twooo two twoo...
picoCTF 2021 Solution - Wireshark twoo twooo two twoo...
Understanding Threat Actors: Insights from OffSec TH-200 Course module 2 section 1
Understanding Threat Actors: Insights from OffSec TH-200 Course module 2 section 1
Hunting on Endpoints: Insights from OffSec TH-200 Course module 5 Section 1
Hunting on Endpoints: Insights from OffSec TH-200 Course module 5 Section 1
OffSec - Access
OffSec - Access
System Info Dump Trojan - AKA Youtube Viewer
System Info Dump Trojan - AKA Youtube Viewer
Communication and Reporting for Threat Hunters: Insights from OffSec TH-200 Course module 3
Communication and Reporting for Threat Hunters: Insights from OffSec TH-200 Course module 3
Ransomware Actors and Their Strategies: Insights from OffSec TH-200 Course module 2 section 2
Ransomware Actors and Their Strategies: Insights from OffSec TH-200 Course module 2 section 2
Cost of Living Comparison Between Tokyo and Shanghai
Cost of Living Comparison Between Tokyo and Shanghai
Living in Japan: How to Immigrate, Reasons to Reconsider, Tips, and Challenges
Living in Japan: How to Immigrate, Reasons to Reconsider, Tips, and Challenges