Home
Niraj Kharel
Cancel

Offensive C++ Basics

Supposed to be Intro The code snippet below and its explanations cover various useful Windows functions and APIs that can be implemented using the C++ language for system programming purposes. Her...

Red Teaming - Pivoting Perspectives

Alright, imagine this hilarious little memo I wrote down for my future self: “Yo, Future Me! I made this easy-peasy guide for ya, just in case you hack into that machine someday. No hacking stuff h...

Red Teaming - Havoc C2 Team Server and Profiles

The Team Server The C2 Profiles You can probably refer to the Havoc’s documentation to understand the basic syntax of the profile in detail. I will try to explain the default havoc profile which i...

Red Teaming - Havoc C2

Introduction C2 frameworks, also known as command and control, enables red teamers to control and communicate with compromised systems. Havoc is a modern and malleable post-exploitation command and...

HTB - PC

HTB — PC A detailed walkthrough for solving PC on HTB. The box contains vulnerability like SQL Injection, Plaintext credential on the database, and privilege escalation through PyLoad. Enumerat...

HTB - MonitorsTwo

HTB — MonitorsTwo A detailed walkthrough for solving MonitorsTwo on HTB. The box contains vulnerability like default credentials, CVE-2022–46169 Cacti Remote Code Execution and Privilege Escalatio...

HTB - Only4You

HTB — Only4You A detailed walkthrough for solving Only4You on HTB. The box contains vulnerability like File Inclusion, Weak Credentials, Cypher Injection, Command Injection and privilege escalatio...

HTB - Busqueda

HTB — Busqueda A detailed walkthrough for solving Busqueda on HTB. The box contains vulnerability like Python Code Injection, Hardcoded Credentials, Credential Reuse, and privilege escalation thro...

HTB - Socket

HTB — Socket A detailed walkthrough for solving Socket Box on HTB. The box contains vulnerability like SQLite Injection, Weak Hashing and privilege escalation through SUDO shell scaping. Enumer...

HTB - Stocker

HTB — Stocker It is an easy machine in Hack The Box. It contains vulnerabilities like NoSQL Injection, File Inclusion on PDF conversion and Credential reuse. Enumeration NMAP Disable the ping...