Welcome! This repository is a collection of my hands-on experience in various cybersecurity labs, Capture The Flag (CTF) challenges, and platform-specific rooms (TryHackMe, HackTheBox, etc.).
The goal of this repository is two-fold:
- Knowledge Consolidation: To document my technical journey and reinforce my understanding of exploit vectors and remediation.
- Community Value: To provide clear, step-by-step walkthroughs that help others learn the "why" behind the "how."
In every writeup, I aim to cover the full lifecycle of a penetration test:
- Reconnaissance: Active and passive information gathering.
- Enumeration: Identifying services, versions, and potential vulnerabilities.
- Exploitation: Gaining initial access using industry-standard tools and manual techniques.
- Privilege Escalation: Elevating access to Administrative/Root levels.
- Reporting: Documenting findings with a focus on impact and mitigation.
| Date | Platform | Lab Name | Focus Area | Link |
|---|---|---|---|---|
| March 2026 | TryHackMe | Blue | Windows Exploitation (MS17-010), EternalBlue | View Writeup |
| TBD | TBD | Next Lab... | Coming Soon | Link |
- OS: Kali Linux / macOS
- Scanning: Nmap
- Exploitation: Metasploit
- Analysis: Wireshark, Burp Suite
- Cracking: John the Ripper, Hashcat
- LinkedIn: My Linkedin handle
- TryHackMe Profile: My Tryhackme acc
"Knowledge is power, but sharing it is a superpower."