Repost: HTB Code and my journey through Python Sanbox Escapes
Due to time constraints, I have decided to populate this page with some of my old writeups. This is one of my favorite writeups I have ever made, so I want to highlight it. I won’t repost all the writeups from my legacy site. Only the ones I feel highlight my growth and skills. IntroductionI had previously tackled Code during Season 7 and it was a great way to test my python skills. This is a Linux-based machine that blends web exploitation, Python, sandbox escapes, and Linux privilege escalation. The machine follows a natural progression from enumeration to jail escape to credential discovery to privilege escalation. Along the way it reinforces important concepts like bypassing restricted environments, handling reverse shells, and abusing misconfigured sudo scripts. SummaryIn this machine we will cover: Enumerating services with Nmap to identify SSH and a Web Server with a Python code editor Escaping a Python sandbox jail by reconstructing banned functions Executing a reverse she...
How to Start Cybersecurity in 2026
Cybersecurity in 2026“Intellectual growth should commence at birth and cease only at death.” - Albert Einstein Cybersecurity is a moving target. As emerging technologies are adopted, the vulnerabilities inherent to them become immediate risks for organizations. Because the field is so vast, it is impossible to create a single “perfect” guide that covers every niche. Instead, I’ve designed this roadmap around the concept of T-shaped skills. My goal is to help you build a wide, resilient foundation while giving you the framework to dive deep into a specialization; whether that is my own passion for Red Teaming and OS security, or your own path in Defense or GRC. This guide is intended to be a living document, adaptable as you progress from a curious student to a technical professional. Without further ado, let’s get into it! The T-Shaped Cybersecurity ProfessionalThe concept of the “Master Generalist” or T-Shaped Skills is something I first encountered via ThePrimeagen. It’s a framewo...
Welcome!
Greetings and ExpectationsWelcome to my new blog/portfolio site! This will mark my journey into a deeper and more serious approach to my career as not just a penetration tester, but a security researcher. I will continue releasing writeups for different CTFs and platforms, but on top of that I will also touch on topics that I find interesting. As I read through different books on topics like C Programming, Operating Systems, Binary Exploitation, or even Reverse Engineering, I will try and bring my perspective and takeaways from said books. I will attempt to combine my over one year of experience as both a self-taught Penterster and a Cybersecurity student to provide beginners and intermediates with plenty of information and guidance. I would prefer if the people who read my blog utilize it as a learning tool and not just a simple copy and paste for CTFs. I encourage everyone to do their own research on any topics where you feel my posts lack clarity or detail. Legacy SiteFor th...



