A walkthrough of the Hercules HTB machine, featuring LDAP injection, custom tooling, and AD chain attacks.
A journey through API fuzzing, Cacti vulnerabilities, and a Docker API misconfiguration leading to a full Windows host takeover.
Diving into the Matrix with Whiterabbit. From subdomain hunting and proxying internal services to reverse engineering custom binaries for a satisfying root.