CTF writeups, cybersecurity research, learning notes, and project build explanations.
A detailed walkthrough of how I designed and built a honeypot that logs attacker activity, including the architecture, socket programming, and logging system.
Read MoreA practical guide covering Nmap basics — port scanning, service detection, OS fingerprinting, and useful scan types for reconnaissance.
Read MoreAn introduction to Burp Suite — setting up the proxy, intercepting requests, using the scanner, repeater, and intruder for web application testing.
Read MoreSolutions and explanations for TryHackMe rooms covering web exploitation, Linux privilege escalation, and network security challenges.
Read MoreDetailed solutions for PortSwigger Web Security Academy labs including SQL injection, XSS, authentication bypasses, and access control vulnerabilities.
Read MoreStudy notes covering Linux privilege escalation techniques — SUID binaries, cron jobs, kernel exploits, and misconfigured permissions.
Read MoreA collection of notes from my cybersecurity learning journey — concepts, tools, techniques, and resources I've found useful.
Read MoreBlog posts are coming soon! I'm currently working on documenting my cybersecurity journey and writing detailed writeups.