Explore >> Select a destination


You are here

blog.kuhi.to
| | siunam321.github.io
2.4 parsecs away

Travel
| | Back in November 2024, me and my university CTF team NuttyShell placed champion on PwC's Darklab Hack A Day CTF competition. One of the champion prizes is "Sponsorship of Offensive Security Certified Professional (OSCP) PEN-200 certification (90-day lab access)". Since I already earned OSCP back in 2023, and having a strong interest in web security, I requested the organizer to switch it to OffSec Web Expert (OSWE), which they happily did so! Eventually, I earned OSWE on June 2nd, 2025!
| | x0rb3l.github.io
5.4 parsecs away

Travel
| | In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certification. This post is aimed at discussing my experience with the third and final course: Windows User Mode Exploit Development (WUMED) and Offensive Security Exploit Developer (OSED) exam. I will also briefly discuss the motivation behind obtaining all three certs within a six-month period.WUMED focuses on identifying vulnerabilites through reverse engineering Windows applications that run in user mode. It takes it a step beyond regular stack-based overflows and teaches you how to bypass common mitigations such as ASLR and DEP. It also teaches you how to create your own custom 32-bit shellcode.You can find out ...
| | www.jenkins.io
4.1 parsecs away

Travel
| | The Jenkins project's response to a critical security vulnerability in the "Spring" framework.
| | hub.dragos.com
21.7 parsecs away

Travel
| Be the first to navigate the future of OT cybersecurity with the latest industrial threats and strategic recommendations. Register now ?