Offensive Security Expert | Passionate Pentester | Active CTF Player
This blog aims to document and share my experiences in cybersecurity, whether it's offensive (Red Team) or defensive (Blue Team) operations.
Each writeup is a learning opportunity, covering real-world techniques used in information security, from web vulnerabilities to Active Directory attacks, and forensic analysis.
The goal is simple: learn, share, and grow together in this fascinating field of cybersecurity.
My ranks and scores on major platforms
In-depth target analysis with comprehensive enumeration and identification of potential attack vectors.
Applying MITRE ATT&CK techniques to exploit discovered vulnerabilities and gain initial access.
Detailed writeup with screenshots, commands, and explanations to share knowledge with the community.
Discover my writeups and learn new cybersecurity techniques