🏠
dev-angelist
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 🏠Home
  • πŸ“’Certification Notes
    • Certified Ethical Hacker (CEH) Practical
    • CRTP
    • eWPTXv3
    • eCPPTv3
    • eWPTv2
    • eJPTv2
  • ✍️WRITEUPS & WALKTHROUGHS
    • TryHackMe (THM)
    • HackTheBox (HTB)
    • VulnHub
    • DockerLabs.es
    • PortSwigger - Web Sec Academy
    • HomeMade Labs
  • πŸ•ΈοΈWEB
    • eWPTXv3
    • eWPTv2
    • WAPT
    • DVWA
    • Secure Bank
    • Mutillidae II
    • WebSafeHub (WSH)
    • PortSwigger - Web Sec Academy
  • Common Services Pentest
    • Web Services - 80/443/8080
      • Tomcat
        • Lab Setup & Configuration
        • Enumeration
        • Exploitation
        • Mitigation & Hardening
    • SMB - 139/445
  • πŸ‘©β€πŸ’»CODING
    • 🐍Python
      • Python Offensive
      • Email Header Analyzer
      • Dir-Brute
      • Port-Scanner
      • Finger User Enumeration
    • DevSecOps
    • πŸ”ΉPowershell
  • πŸ”΄Offensive Security
    • Active Directory (AD)
      • CRTP
      • AD HomeMade Lab
  • Privilege Escalation
    • Windows Privilege Escalation
  • πŸ”Crypto & AI/ML
    • Crypto & Blockchain
      • Blockchain Security
        • Blockchain Architecture
          • 1.1 Characteristics and Features
          • 1.2 Core Components
          • 1.3 Consensus Algorithm
          • 1.4 Cryptography
          • 1.5 Cryptocurrency
        • Front-end Risks
          • 2.1 MFA and Blockchain
          • 2.2 Front-end
          • 2.3 OWASP Modeling for Blockchain
          • 2.4 Wallet Attacks
          • 2.5 Client Vulnerabilities
        • Back-end Risks
          • 3.1 Consensus Vulnerabilities
          • 3.2 Mining Pool Vulnerabilities
          • 3.3 Network Vulnerabilities
            • 3.3.1 DoS/DDoS/BDoS Attacks
            • 3.3.2 Delay Attacks
            • 3.3.3 Partition Attacks
            • 3.3.4 Sybil Attacks
            • 3.3.5 Time Jacking
            • 3.3.6 Transaction Attacks
        • Mining-Risks
          • 4.1 Mining Overview
          • 4.2 Proof of Stake Post Merge Ethereum
          • 4.3 Crypto Mining Malware (Cryptojacking)
          • 4.4 Zero Trust Models
          • 4.5 Byzantine Fault Tolerance
        • Blockchain as a Service
    • AI/ML Pentest
  • ACTIVE DIRECTORY
    • AD Enumeration
  • Guides & Articles
    • My Articles
    • Guides & Tutorials
      • Burp Suite - Configuration
      • Quickemu - VM
      • Setting Up SSH Keys
      • Building an AD Lab
      • Work Guidelines
  • Windows
    • Windows Enumeration
    • Windows Privilege Escalation
  • INTELLIGENCE GATHERING
    • OSINT
  • LINUX (tbd)
    • Linux Enumeration
    • Linux Privilege Escalation
Powered by GitBook
On this page
  • Welcome βœ‹
  • About ℹ️
  • About the Content πŸ“š
  • Copyright and Sharing Policy Β©

Home

NextWeb Services - 80/443/8080

Last updated 1 month ago

Welcome βœ‹

$whoami

πŸ‘‹ Hi, I’m dev-angelist, a Cyber Security Enthusiast with a strong passion for IT, ethical hacking, and knowledge sharing. I believe in working smarter, automating repetitive tasks, and constantly pushing my skills further. πŸ‘¨β€πŸ’» ✍️ This blog is my personal knowledge repository where I document everything I learn from Cybersecurity, Pentesting, and Computer Science and Technology though certifications, lab machines (CTFs), challenges, and real-world experiences. πŸ“”

πŸ’‘ My advice? Experiment boldly. Test every tool and technique you come across. Some might fail, but those failures can teach you the technical reasons whyβ€”and might even inspire you to create your own hacking tool! ✏️

πŸ₯… The goal is simple: to share insights, techniques, and ideas that can help others on their cybersecurity journey. πŸ™ I hope these notes help you as much as they’ve helped me while creating them. πŸ‘ˆ Check the menu on the left to get started! πŸš€


About ℹ️

  • GitHub ->

  • My Portfolio ->

  • Medium ->

  • Twitter/βœ–οΈ ->

  • BlueSky ->

πŸ‘‡Feel free to send me an email βœ‰οΈ


About the Content πŸ“š

πŸ’» The content of this blog is primarily based on my hands-on experiences and continuous learning journey in the cybersecurity realm. It includes:

  • 🌐 Insights into the web security domain, ranging from fundamental to advanced attack vectors.

  • ✍️ A dedication to improving my technical writing skills to document knowledge clearly and effectively for others.

  • 🀝 A strong commitment to contributing to the open-source community, sharing resources, tools, and techniques to help others grow in their cybersecurity journey.

πŸ“˜ Each piece of content reflects not only my learnings but also my passion for exploring new frontiers in cybersecurity and giving back to the community. 🀝

πŸ’‘ If you share the same passion for learning and experimenting, I hope you’ll find these notes valuable. Together, we can grow and make the cybersecurity community even stronger! πŸ’ͺ

Materials are not exhaustive and contents are based on open-source materials and my own interpretations. Mistakes might exist and It may not always be up-to-date, so use it responsibly and at your own risk.


Copyright and Sharing Policy Β©

πŸ“ The content on this blog is my personal work and interpretation of public materials. While my commentary and analysis are protected, you are free to:

  • Share links to this content on social media or other websites.

  • Redistribute content, as long as you credit me and include a link to the original resource.

Disclaimer: This site is for educational purposes only. It should never be used for malicious or illegal activities.

πŸ› οΈ Writeups and Walkthroughs of CTFs from platforms like , , , , , as well as using Docker and virtualization tools.

πŸ’» Exploration of practices, particularly in and , with a focus on security tools and automation scripts.

πŸ›‘οΈ practices, emphasizing secure development lifecycles and automated security testing.

πŸ”“ Deep dives into topics like exploitation, , and , exploring the intersection of emerging technologies and their vulnerabilities.

TryHackMe
HackTheBox
VulnHub
DockerLabs
PortSwigger
custom-built lab
coding
Python
PowerShell
offensive security
Active Directory
Blockchain security
AI/ML pentesting
🏠
https://github.com/dev-angelist
https://dev-angelist.github.io/
https://medium.com/@dev-angelist
https://x.com/dev4ngelist
https://bsky.app/profile/dev-angelist.bsky.social
dev-angelist - OverviewGitHub
https://github.com/dev-angelist
Logo
Page cover image
DevSecOps