LABS &
PLATFORMS
Active practice across dedicated platforms, CTF competitions, bug bounty programmes, and a personal home lab. Continuous real-world skill development.
ACTIVE
PLATFORMS
Structured learning paths from beginner to advanced, covering web exploitation, Active Directory attacks, privilege escalation, network security, and SOC operations.
- Jr Penetration Tester
- SOC Level 1
- Pre-Security
- Add your completed paths here
Real-world lab machines simulating enterprise environments. Machines ranging from Easy to Insane, requiring full enumeration, exploitation, and privilege escalation chains.
- Add machines you've rooted here
- e.g. Lame (Easy) — legacy Samba exploit
- e.g. Blue (Easy) — EternalBlue / MS17-010
- e.g. Jerry (Easy) — Tomcat manager RCE
Responsible disclosure on live programmes. Legal, real-target practice on public bug bounty programmes with actual business impact and verifiable findings.
- Web application vulnerabilities (OWASP Top 10)
- API security testing (BOLA, mass assignment)
- Authentication bypass and logic flaws
- Add any reported/disclosed bugs here
Timed competitions requiring speed and creativity across forensics, cryptography, web exploitation, binary exploitation (pwn), and reverse engineering.
- Web — XSS, SQLi, SSRF, JWT attacks
- Forensics — PCAP analysis, memory forensics
- Crypto — RSA, base encodings, hash cracking
- Pwn / Rev — buffer overflow, binary analysis
HOME
LAB SETUP
Isolated virtualised environment for malware analysis, network security testing, and Active Directory attack simulation. No live internet exposure.
BLUE TEAM
AWARENESS
Windows Event Logs, Syslog, and SIEM alerts (Splunk, Elastic) — understanding what defenders see to improve attack stealth and surface detection gaps.
How CrowdStrike, Defender ATP, and Carbon Black flag behaviour — studied to craft realistic PoC payloads and provide EDR tuning advice post-engagement.
Tracking NVD, vendor advisories, and PoC releases. N-day exploitability assessment before patches are widely applied.
Mapping attack techniques to ATT&CK TTPs — enabling detection rule recommendations and red-to-blue knowledge transfer in pentest reports.