👋 Welcome to the site!

First and foremost, I like to keep the focus on learning and responsible research here. It's exciting to explore offensive security tradecraft, don't get me wrong. But I'd like to recognize the importance behind responsible use of the techniques and code I share on this blog. My goal is to enhance security not abuse it. Okay! With that little disclaimer out of the way, enjoy your stay and hit me up on discord if you want to learn more about a given topic, etc.

Quick links to popular content can be found below:

Shellcoding/x64 Assembly Series
UAC Bypass Techniques
Create your own Netcat using Python

Recent posts

Create your own C2 using Python- Part 2

7 minute read

Hey everyone! Welcome to Part 2 of the Create your own C2 series. You have likely learned by now this is not going to be some crazy beefed out C2. My main...

Create your own C2 using Python- Part 1

10 minute read

Back in the good ole days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I wa...

x64 Assembly and Shellcoding 101 - Conclusion

16 minute read

Well it’s been a fun ride, but we’ve reached our destination. 🚗 Time to wrap things up with our Assembly and Shellcoding 101 course and move on to the next e...

x64 Assembly and Shellcoding 101 - Part 6

7 minute read

Today is reverse shell day! I’m sure most of you were hoping we’d eventually be able to discuss writing a reverse shell using x64 assembly, and today just s...