2025
- January 12 - THM | Intro to Malware Analysis
- January 12 - THM | x86 Architecture Overview
- January 12 - THM | x86 Assembly Crash Course
- January 12 - THM | Windows Internals
- January 19 - THM | Red Team Fundamentals
- January 19 - THM | Red Team Engagements
- January 19 - THM | Red Team Threat Intel
- January 19 - THM | Red Team OPSEC
- January 19 - THM | Intro to C2
- January 19 - THM | Red Team Recon
- January 19 - THM | Weaponization
- January 19 - THM | Password Attacks
- January 19 - THM | Phishing
- January 19 - THM | The Lay of the Land
- January 19 - THM | Enumeration
2024
2023
- April 18 - OverTheWire | Bandit | Write-Up
- May 4 - HTB | Meow | Write-Up
- May 4 - HTB | Fawn | Write-Up
- May 4 - HTB | Dancing | Write-Up
- May 4 - HTB | Redeemer | Write-Up
- May 4 - HTB | Explosion | Write-Up
- May 4 - HTB | Preignition | Write-Up
- May 4 - HTB | Mongod | Write-Up
- May 4 - HTB | Synced | Write-Up
- May 5 - HTB | Appointment | Write-Up
- May 5 - HTB | Sequel | Write-Up
- May 6 - HTB | Crocodile | Write-Up
- May 6 - HTB | Responder | Write-Up
- May 8 - HTB | Three | Write-Up
- May 9 - HTB | Ignition | Write-Up
- May 9 - HTB | Bike | Write-Up
- May 9 - HTB | Funnel | Write-Up
- May 10 - HTB | Pennyworth | Write-Up
- May 10 - HTB | Tactics | Write-Up
- May 11 - HTB | Archetype | Write-Up
- May 11 - HTB | Oopsie | Write-Up
- May 18 - HTB | Vaccine | Write-Up
- May 21 - HTB | Unified | Write-Up
- May 23 - HTB | Included | Write-Up
- May 24 - HTB | Markup | Write-Up
- May 25 - HTB | Base | Write-Up
- May 26 - HTB | Lame | Write-Up
- May 26 - HTB | Find The Easy Pass | Write-Up
- May 27 - HTB | Weak RSA | Write-Up
- May 28 - HTB | Jerry | Write-Up
- May 31 - HTB | You know 0xDiablos | Write-Up
- June 1 - HTB | Netmon | Write-Up
- June 3 - HTB | Blue | Write-Up
- June 8 - HTB | Under Construction | Write-Up
2022
- October 11 - THM | Pre Security Path | Introduction
- October 12 - THM | Intro to Offensive Security
- October 12 - THM | Intro to Defensive Security
- October 12 - THM | Careers in Cyber
- October 12 - THM | What is Networking?
- October 12 - THM | Intro to LAN
- October 12 - THM | OSI Model
- October 12 - THM | Packets and Frames
- October 12 - THM | Extending Your Network
- October 12 - THM | DNS in detail
- October 12 - THM | HTTP in detail
- October 12 - THM | How websites work
- October 12 - THM | Putting it all together
- October 12 - THM | Linux Fundamentals Part 1
- October 12 - THM | Linux Fundamentals Part 2
- October 12 - THM | Linux Fundamentals Part 3
- October 12 - THM | Windows Fundamentals 1
- October 12 - THM | Windows Fundamentals 2
- October 12 - THM | Windows Fundamentals 3
- October 13 - THM | Web Application Security
- October 13 - THM | Operating System Security
- October 13 - THM | Network Security
- October 13 - THM | Intro to Digital Forensics
- October 13 - THM | Security Operations
- October 14 - THM | Tutorial
- October 14 - THM | Starting Out In Cyber Sec
- October 14 - THM | Introductory Researching
- October 14 - THM | Introductory Networking
- October 14 - THM | Nmap
- October 14 - THM | Network Services
- October 14 - THM | Network Services 2
- October 14 - THM | Burp Suite: The Basics
- October 14 - THM | OWASP Top 10 - 2021
- October 14 - THM | OWASP Juice Shop
- October 14 - THM | Upload Vulnerabilities
- October 14 - THM | Pickle Rick
- October 14 - THM | Hashing - Crypto 101
- October 14 - THM | John the Ripper: The Basics
- October 14 - THM | Encryption - Crypto 101
- October 14 - THM | Active Directory Basics
- October 14 - THM | Metasploit: Introduction
- October 14 - THM | Metasploit: Exploitation
- October 14 - THM | Metasploit: Meterpreter
- October 14 - THM | Blue
- October 14 - THM | What the Shell?
- October 14 - THM | Common Linux Privesc
- October 14 - THM | Linux PrivEsc
- October 15 - THM | Vulnversity
- October 15 - THM | Basic Pentesting
- October 15 - THM | Kenobi
- October 15 - THM | Steel Mountain
- October 16 - THM | Nessus
- October 16 - THM | Hydra
- October 17 - THM | Walking An Application