Knowledge Base
A running collection of notes from real engagements — CVE reproducing, exploit development, recon techniques, and the tooling I reach for repeatedly. Written for myself, so expect rough edges and the occasional half-finished section.
Nothing here is novel research. For original findings, see Research. These notes exist because muscle memory is overrated and I prefer having a searchable reference over remembering the exact flag order for every tool.
Use the sidebar to navigate by category, or hit the search box at the top to jump directly to what you need.