Dojo¶
This is my hacking dojo: a living, structured knowledge base for hands-on security research, labs, and tooling. It is designed to capture findings, workflows, and repeatable techniques across platforms and targets.
It is automatically built and deployed as a static documentation site. The content, tooling, and research notes are treated as versioned, reproducible assets.
Content types:
- Writeups: step-by-step challenge analysis
- Cheatsheets: fast operational reference
- Scripts: automation and helper tooling
- Labs: vulnerable environments and targets
Attention: Concentrate on OverTheWire and PortSwigger - Web Security Academy.
Roadmap:
- Focus: Web exploitation, CSP, auth flows
- Targets:
- Goal: deepen exploitation and defensive patterns
Structure¶
HackTheBox¶
HackTheBox Machines¶
HackTheBox Challenges¶
HackTheBox Helpers¶
HackTheBox Vulnlab Machines¶
Hacker101CTF¶
CTF's¶
OverTheWire¶
- Solutions and walkthroughs for OverTheWire challenges.
PicoCTF¶
- General notes on picoCTF challenges.
THM Machines¶
- Documentation of machines solved on TryHackMe.
PortSwigger - Web Security Academy¶
VulnHub¶
- Notes and solutions for machines hosted on VulnHub.
DVWA¶
- Notes and solutions for DVWA challenges.
PentesterLab¶
XSSrat's Labs¶
Resources¶
Other¶
- Command Line Challenge: Notes from cmdchallenge.com
- UnderTheWire: Solutions and write-ups for challenges from UnderTheWire.
- Holiday Hack Challenge: Solutions and write-ups for challenges from Holiday Hack Challenge.
Utility Scripts¶
- Clean Temp Folders
- convert_hex32bit.py: A Python script to convert hexadecimal values to 32-bit format.
Purpose¶
This dojo is a long-term security knowledge store. It documents research, exploit reasoning, lab work, and reusable tooling as a single system, not a collection of notes.
Feel free to explore the content and use the files for learning and improving your own skills.
Happy hacking! (..◜ᴗ◝..)