Practical notes for Cybersecurity Professionals. Build repeatable attack paths, validate controls, and sharpen offensive and defensive depth.
Pentesting Notes Blog GitHub Featured PathsLearn the foundation concepts in Ethical hacking and Penetration Testing.
Game of Active Directory from setup, enumeration through privilege escalation paths.
Command-level machine walkthroughs with recon, exploitation, and post-exploitation coverage.
Retired box walkthroughs documented for reproducibility and skills benchmarking.
Walking through challenge labs on the TryHackme Platform.
Build logs for lab architecture, tooling choices, and hardening-focused implementation details.
Help sustain ongoing writeups, updated playbooks, and lab maintenance work.