Security research & red teaming

Sharper writeups, cleaner tactics.

I break things to understand them: from AD to web and IoT. Here you’ll find field notes, walkthroughs, and reproducible payloads without the fluff.

9 Deep-dive posts
4 Core tracks: AD, Web, IoT, Offensive coding
Practical first Payloads, code, and checks

Currently exploring

  • Hardening and abusing Active Directory trust paths.
  • Web edge cases: deserialization, SSRF, and logging sinks.
  • IoT firmware reversing for hidden creds and command channels.
  • Offensive coding: automation, payload tooling, and evasion scripts.
Latest drops

Fresh from the lab

Bite-sized writeups with commands you can reuse. No filler—just what you need to reproduce the exploit path.

Kerberos 101

Kerberos 101

First of all in this blog we will discuss an authentication protocol called Kerberos. what is Kerberos? How does it work? Authentication flow How can …

Log4Shell (CVE-2021-44228)

Log4Shell (CVE-2021-44228)

First of all to understand the vulnerability we should reverse it. This blog will Answer these Questions 1- What is log4j 2- LDAP 3- JNDI 4- How …

Blind SQL with Python

Blind SQL with Python

In this blog we will solve portswigger labs for Blind SQL injection with python What is Blind SQL? It’s type of SQL injection happens when the …

PickelC2-Bot

PickelC2-Bot

PickleC2-Bot This discord bot will help you to control your target through PickleC2 Download WHAT’s a PickleC2? PickleC2 is a simple C2 …