Self-development journey into the world of offensive cybersecurity. This blog serves as a means to educate others in offensive techniques, underlying technical concepts, and relevant events.
10
Apr

Building a Mythic C2 Agent in Python — Part 2: Batched Tasking, HTTPS, and the httpx Profile

27 min read
06
Apr

Mythic - Developing Custom Agent - Part 1 Architecture & Your First HTTP Callback

25 min read
31
May

Insights - Cobalt Strike (data_jitter)

1 min read
15
May

Abusing Windows Token

4 min read
03
Jan

Understanding structs and pointers

9 min read