👋 Welcome to the site!

First and foremost, I like to keep the focus on learning and responsible research here. It's exciting to explore offensive security tradecraft, don't get me wrong. But I'd like to recognize the importance behind responsible use of the techniques and code I share on this blog. My goal is to enhance security not abuse it. Okay! With that little disclaimer out of the way, enjoy your stay and hit me up on discord if you want to learn more about a given topic, etc.

Quick links to popular content can be found below:

Shellcoding/x64 Assembly Series
UAC Bypass Techniques
Create your own Netcat using Python

Recent posts

Sending Sysmon Logs to Elastic ELK stack

1 minute read

Let’s pickup where we left off. If you haven’t done so already, please do check out the previous writeup on how to setup Elastic Stack, Logstash, and Kibana...

Installing Elastic Stack (ELK) from Scratch

3 minute read

Hey there red team….I mean BLUE TEAM cadet 😅 I don’t just focus on red team stuff you know…and it’s been long overdue that I do a writeup on not just red t...