Enumerating Kerberos Delegations in Active Directory Using ldapsearch
Identifying unconstrained, constrained, and resource-based constrained delegation in AD
Identifying unconstrained, constrained, and resource-based constrained delegation in AD

This report covers the Infostealer campaign known as the FakeCaptcha/Click-Fix Campaign. Background On March 4, 2025, an alert was triggered after a suspicious PowerShell script ran on a user’s m...
Using unshadow to combine passwd and shadow files for password cracking
Understanding how writable /etc/passwd can lead to privilege escalation
Joy is a beginner-to-intermediate level boot2root challenge hosted on VulnHub. The machine exposes multiple misconfigured services across FTP, HTTP, SMB, SMTP, and SNMP, requiring thorough enumera...
Detailed security assessment write-up for the Secura Lab.

Tips and insights on passing the Certified Penetration Tester Specialist
My first 4 CVEs from vulnerability hunting.

HTB Certification and tips for passing the CWES exam.

Representing the Philippines at ASEAN Cyber Shield 2024, finishing 15th place.