top0n3@home:~$

  • Hackthebox Conversor machine write up | PENTEST

    H3ll0 pwn3rs !!! Here is a writeup for Hackthebox Conversor machine Hackthebox Conversor box is an easy linux machine. I exploited the machine as follow: Exploit XSLT Injection to upload...

  • Kerberos protocol deep explanation | pentest

    Kerberos Protocol deep explanation for beginners Kerberos protocol is widely used to implemente authentification especilly on Active Directory (AD) environment. To success as internal penetration tester, it is crucial to...

  • Hackthebox CERTIFIED WEB EXPLOITATION SPECIALIST REVIEW, Tips & Tricks | PENTEST

    H3ll0 H4ck3rs !!! End September 2025, i passed Hackthebox Certified Web Exploitation Specialist by scoring 100% on my first attempt. In this article, i will make a review of this...

  • PicoCTF 2025 writeup | CTF

    Pico CTF 2025 Write up . By Bug Reapers Team Pico CTF is an annual Cyber security competition for undergrade/grate Studen. Our Team Bug Reapers took part of 2025 one...

  • PicoCTF 2025 writeup | CTF

    Pico CTF 2025 Write up . By Bug Reapers Team Pico CTF is an annual Cyber security competition for undergrade/grate Studen. Our Team Bug Reapers took part of 2025 one...