About

About Me

I’m an offensive security enthusiast focused on practical exploitation, adversary simulation, and continuous learning through hands-on labs and research.

I use this blog as a place to document:

  • Technical walkthroughs and writeups
  • Lessons learned from labs and assessments
  • Research notes and methodology breakdowns
  • Tooling experiments and workflow improvements
  • Mistakes, troubleshooting, and practical fixes

What You’ll Find Here

This site primarily contains:

  • HackTheBox writeups
  • CTF walkthroughs
  • Security notes and cheatsheets
  • Research articles
  • Red team methodology references
  • Lab setup guides
  • Tool reviews and comparisons
  • Career and learning reflections within cybersecurity

The goal is to keep things practical, technical, and reproducible.


Philosophy

I believe offensive security is best learned by building, breaking, troubleshooting, and repeating the process.

There’s a major difference between memorizing commands and actually understanding:

  • Why an attack works
  • What assumptions failed
  • How trust relationships are abused
  • What defenders can monitor
  • How environments behave under pressure

This blog is part documentation, part learning journal, and part knowledge base.


“The quieter you become, the more you are able to hear.” — Ram Dass