Knowledge Base

Resources

Technical blog posts, tutorials, and CTF write-ups covering offensive security, penetration testing, and security research.

Jan 24, 202612 min4.2k

Building a Custom Port Scanner in Python

A deep-dive into building a multi-threaded port scanner from scratch — covering raw sockets, service fingerprinting, and performance optimization.

PythonNetworkingTools
Read Article
Dec 18, 202518 min6.8k

Reverse Engineering Android APKs for Bug Bounties

Step-by-step walkthrough of decompiling, patching, and analyzing Android applications to find security vulnerabilities in bug bounty programs.

Bug BountyAndroidReverse Engineering
Read Article
Nov 5, 202510 min3.5k

Automating Recon with Bash & Python

How I chain together subdomain enumeration, port scanning, and screenshot tools into a single automated recon pipeline.

AutomationBashRecon
Read Article
Oct 12, 202515 min5.1k

Understanding SSRF Attacks in Cloud Environments

Exploring server-side request forgery in AWS, GCP, and Azure — from IMDS metadata exfiltration to internal service pivoting.

CloudSSRFWeb Security
Read Article
Sep 20, 202520 min9.3k

Linux Privilege Escalation Cheat Sheet

A comprehensive reference for Linux privesc vectors — SUID binaries, cron jobs, kernel exploits, capabilities, and more.

LinuxPrivEscReference
Read Article
Aug 8, 202514 min7.6k

Zero to Hero: Setting Up a Home Security Lab

Complete guide to building a home lab with Proxmox, vulnerable VMs, Kali Linux, and a segmented network for safe testing.

Lab SetupInfrastructureGuide
Read Article