web & api internals
Notes on chaining business-logic flaws, auth bypasses, SSRF, race conditions and IDORs. The subtle stuff that scanners never find on their own.
This is my personal corner of the internet — write-ups, half-baked thoughts, field notes from eight years of breaking things for a living. Nothing here speaks for any employer. Just me, after hours, with coffee.
Topics I keep coming back to. Rough map of my obsessions — each card is a cluster of posts, CTF notebooks and late-night rabbit holes.
Notes on chaining business-logic flaws, auth bypasses, SSRF, race conditions and IDORs. The subtle stuff that scanners never find on their own.
Lab write-ups on misconfigs, weak service accounts, unpatched edges — the long quiet walk from initial foothold to domain admin.
Runtime hooking with Frida, SSL pinning bypasses, insecure storage — the stuff that surprises me every time I pick up a new app.
IAM abuse paths, over-permissive roles, metadata attacks, cross-account trust. One leaked key, mapped out end to end.
HackTheBox, TryHackMe, personal lab machines — unfiltered notes including the wrong paths, the dead ends, and the moment something finally clicks.
Small Python utilities, Burp extensions, semgrep rules and shell one-liners I keep rewriting. Posting them here so future-me can find them again.
I started breaking things legally in 2018, straight out of a Master's in Info Tech at Victoria University, and I haven't really stopped since. 200+ pentests later — across banks, government, fintech and healthcare — I've seen one forgotten SSRF turn into domain-wide compromise through AWS SSM — no 0day required.
This site is my personal notebook. It's where I dump write-ups, CTF notes, half-finished exploit chains and the occasional opinion. Nothing here represents any employer, client, or platform I've ever worked with.
If something here helped you, or if I got something wrong — I'd genuinely love to hear about it. That's half the reason I keep posting.
Each role, in reverse-chronological order. Longest current deployment in bold.
Side work on curated pentest platforms. Conducted entirely off-hours on personal tooling, with zero overlap with full-time employment.
Not an exhaustive list — just what's actually open on my second monitor most days.
Side-quests and rabbit holes. None of this is client work — just what I do after hours on my own kit.
Hundreds of hours of freelance pentests across cloud, API, mobile and internal networks. Kept to myself, published only as generalised lessons.
A rack of beat-up hardware, a pile of VMs and a Proxmox host that's always too hot. Where I test theories before I ever type them into a real client brief.
HackTheBox, TryHackMe, the occasional con CTF with friends. I write the good ones up here — the bad ones I quietly forget about.
Questions, corrections, recommended reading, good CTF invites — all welcome. I reply to almost everything, eventually.
9F2A 4C01 77BE D3A5 · 8821 64FF 90E2 7E3B · 5511 2A6C