top0n3@home:~$

    Pentest landscape
  • Hackthebox CERTIFIED WEB EXPLOITATION SPECIALIST REVIEW, Tips & Tricks

    H3ll0 H4ck3rs !!! End September 2025, i passed Hackthebox Certified Web Exploitation Specialist by scoring 100% on my first attempt. In this article, i will make a review of this exam and give some tricks and tips for those who aspire to pass this exam and maybe make career on...

  • Hackthebox code machine write up

    H3ll0 pwn3rs !!! Here is a writeup for Hackthebox code machine Hackthebox Code box is an easy linux machine. We exploit the machine as follow: Exploit RCE in python sanbox Make reverse shell Found databse file retrive Martin password in md5 hash crack the password with crackstation connect to ssh...

  • Write Good Pentest Report

    As Pentester, your job is not only find vulnerabilities. You must also write a clean report to explain your finding to technical and no technical user. So how to do that correctly !? In this article, we will learn how to write a good pentest repor Introduction Execution Summary Methodology...

  • PNPT tranning Osint module

    What OSINT OSINT (Open Source Inteligence) is a methodology to gather analyse and making decision about information accessible publicly Topic we will cover OSINT Overview Note keeping Sock Puppet Image and Location Email OSINT Password OSINT Username OSINT People OSINT Social Media OSINT Website Osint Business OSINT Wireless OSINT Linux/lab...

  • Linux Privilege Escalation

    Linux privilege escalation Part 0x00: Enumeration Introduction System Enumeration Users Enumeration Network and Services Enumeration Files Enumeration Automation Introduction In Hacking , Enumeration is the most important part. Before Hacking your target system, you need to have Attack surface. After getting attack Surface, time to test attack vectors on this...