top0n3@home:~$

  • PWN Rop chain Trick | CTF

    H3ll0 pwn3rs !!! This article is made to explain some trick and methodologies that you can use to bypass some constraint in your ropchain creation I suppose that you undrstand...

  • Write Good Pentest Report | PENTEST

    As Pentester, your job is not only find vulnerabilities. You must also write a clean report to explain your finding to technical and no technical user. So how to do...

  • PNPT tranning Osint module | PENTEST

    What OSINT OSINT (Open Source Inteligence) is a methodology to gather analyse and making decision about information accessible publicly Topic we will cover OSINT Overview Note keeping Sock Puppet Image...

  • PicoCTF 2025 writeup | CTF

    Pico CTF 2025 Write up . By Bug Reapers Team Pico CTF is an annual Cyber security competition for undergrade/grate Studen. Our Team Bug Reapers took part of 2025 one...

  • Linux Privilege Escalation | PENTEST

    Linux privilege escalation Part 0x00: Enumeration Introduction System Enumeration Users Enumeration Network and Services Enumeration Files Enumeration Automation Introduction In Hacking , Enumeration is the most important part. Before Hacking...