opinion
-

Practical amass – How I configure and use amass in my recon flow
If you’re into recon, you’ve probably heard of amass. It’s a powerful tool for mapping attack surfaces during bug bounty hunting or penetration testing. Here’s why I love it: Instead of repeating what’s already in the official tutorial, I’ll take you through how I use Amass in my bug bounty recon workflow. Global Configuration Once
-

Windows Break ‘N Build Pt. 1 – Setting Up a Vulnerable Domain Controller
Introduction In Part 0, we set up our lab environment by installing VirtualBox, downloading the Windows Server 2025 ISO, and configuring the virtual machine to boot from the ISO. If you haven’t completed those steps, go back to Part 0 for a full walkthrough. Now, in Part 1, we’ll focus on setting up the Windows
-

Why I Keep Crawling Back to Linux
Recently, I got a new laptop. Getting a new laptop is always exciting. This one came pre-installed with Windows, so I decided to give it a shot, despite my long history with Linux. Spoiler alert: it didn’t work out. Windows feels like a toxic ex: an embarrassing mistake I keep trying to make work. While
-

Windows Build ‘N Break – Part 0: Lab Setup
So, here’s the deal: I recently got banned from Hack The Box. For five years. Why? Apparently, my last blog post leaked a few spoilers. A little harsh in my opinion… Starting off the new year strong!!! 😀 In reflecting on it, though, I’ve realized something. As fun as Hack The Box is, it has
-

Cicada – A HTB Writeup
It’s been a while since I’ve done a Hack The Box Machine. In this writeup, I’ll be going through my thought process hacking Cicada. This was a fun little Windows box – there was a lot of pivoting and it was a good review of Windows Pentesting, especially after receiving my GPEN. Enough yapping. Let’s
-

Windows Situational Awareness – Where the shell am I?
When you first get access to a host, oftentimes all you’re given is a prompt for a shell. And this is great if all you’re looking for is proof that you can compromise a single host. But, more often than not, an attacker isn’t going to stop there. They’re going to take over other user