Latest Writeups

Easy

Jumbo Lab

In-depth walkthrough of the Jumbo Lab environment

Broken Access Control Code Review SQL Injection
Medium

Gazole Lab

Security assessment of a petroleum conglomerate's web application

Broken Access Control Database Information Leakage Laravel
Coming Soon

New Lab

Stay tuned for upcoming lab writeups!

TBA

Planned Lab Content

Network Exploitation

Custom network environments, protocol analysis, and network pivoting techniques

Defense Evasion

Antivirus bypass, rootkits, and persistence mechanisms in modern systems

Cloud Security

AWS, Azure, and GCP security configurations and exploitation scenarios

Mobile Security

Android and iOS application security assessments and exploitation

Cryptography

Advanced encryption, hash cracking, and cryptographic implementation flaws

Current Progress

2
Completed Labs
1
Labs in Progress
September 2025
Next Release

Lab Methodology

Each lab writeup follows a structured approach to ensure comprehensive learning:

1

Environment Setup

Detailed configuration of the lab environment and tools required

2

Target Analysis

Comprehensive reconnaissance and vulnerability identification

3

Exploitation Process

Step-by-step exploitation with detailed explanations and alternatives

4

Post-Exploitation

Maintaining access, privilege escalation, and evidence collection

5

Lessons Learned

Key takeaways, defensive measures, and skill development notes