Featured image of post Weaponizing NTLM Relay in modern C2 frameworks

Weaponizing NTLM Relay in modern C2 frameworks

This article explores surgical tradecraft for weaponizing NTLM relay within modern C2 frameworks, detailing how to bypass port 445 restrictions while maintaining OPSEC in hardened environments.

Featured image of post Nexus Breach

Nexus Breach

Writeup for the Nexus Breach challenge I created for the final of the Midnight Flag CTF

Featured image of post Blackdoor

Blackdoor

Writeup for the Blackdoor challenge I created for Midnight Flag CTF 2025 edition

DPOsint

DPOsint writeup for 404CTF 2025

EscapeTwo

Writeup for EscapeTwo lab on HackTheBox

Administrator

Writeup for Administrator lab on HackTheBox

Certified

Writeup for Certified lab on HackTheBox