Welcome!
- Books
- Chess
- Computers
- CTF
- Buffer overflow - linux
- Crack with John the ripper
- Escalation Basics SUID
- Escalation Basics SUID-SUDO
- Escaping Docker container
- Eternal blue
- Fuzzing
- Hack the box
- index
- Juicy Potate — Windows escalation
- Lame Machine (easy)
- Linux process pooling
- Machine - Bashed - Easy - Linux
- Machine - Book - Linux - Medium
- Machine - BountyHunter
- Machine - Devzat - active - medium - completed!
- Machine - Driver
- Machine - Explore
- Machine - Falafel - Linux - Hard - abandoned
- Machine - Forge - Active - Medium - done
- Machine - Frolic - Easy
- Machine - Horizontall
- Machine - Monitors - Hard
- Machine - Nibbles - Easy - Linux
- Machine - Omni - Easy - Windows - Abandoned
- Machine - PopCorn - Linux - Medium -abandoned
- Machine - Previse
- Machine - Seal
- Machine - Traverxec - Retired - Easy
- Machine - Writer (Abandoned)
- Machine beep - Easy - Linux - abandoned
- Machine Blue - Easy - Windows
- Machine Mango - Medium - Linux
- Machine Ophiuchi - Medium - Linux
- Machine Pit - Hard - abandoned
- Machine Previse - Active - Easy
- Machine Sense - Easy - Linux
- Machine Shocker - Easy
- Port discovering
- Reverse shell (bash)
- Reverse tunnel with chisel
- SMB SHARE - SCF FIle attacks
- SqlInjection with sqlmap
- Use of metasploit
- WAR upload reverse shell
- XEE (Xml Entity exploit )
- Economics
- Guitar
- Keyboards
- Leadership