Cyber Security Journal

Structured writeups for labs, CTFs, and security projects.

Personal knowledge base for cyber security labs, CTF writeups, and project notes.

1 Labs
1 CTF
5 Projects
140 Pentest Notes
Structured writeups, repeatable steps, and quick references.

Latest Updates

Fresh entries across labs, CTFs, and projects.

Projects

Access Control Platform (E-Paper Auth)

Advanced access control platform with Authentik OIDC, WebAuthn presence checks, Stripe subscriptions, and QR-based door validation.

2025-01-02 Status: in-progress
Tools flasknodeauthentikstripedockerwebauthn
Tags access-controlwebauthnqrepaperoidcsubscriptions

Projects

BreachWatch

FastAPI and Postgres service with a React UI for monitoring ransomware leak data, OIDC auth, notifications, and PDF reports.

2025-01-02 Status: active
Tools fastapipostgresreacttailwinddockeroidc
Tags ransomwarethreat-intelmonitoringreports

Projects

CISO Assistant Community (Fork)

Fork of the open-source GRC platform with Authentik SSO integration for my IdP.

2025-01-02 Status: fork
Tools dockerauthentikoidc
Tags grccompliancerisksso

Ctf

Example CTF: Forensics Challenge

Workflow for quick triage and artifact extraction.

2025-01-02 Platform: TryHackMe Difficulty: medium Status: complete
Tools wiresharkstrings
Tags forensicspcap

Labs

Example Lab: Initial Recon & Exploit

Baseline workflow for recon, foothold, and post-exploitation notes.

2025-01-02 Platform: HackTheBox Difficulty: easy Status: complete
Tools nmapgobusterlinpeas
Tags reconwebpriv-esc

Projects

Home Lab Automation

Automation notes for lab provisioning, resets, and snapshots to speed up lab rebuilds.

2025-01-02 Status: in-progress
Tools ansibledocker
Tags automationinfra

Pentest Notes

Unified notes across recon, exploitation, post-exploitation, and tooling.

Web

Web Attacks

XSS, SQLi, SSRF, CSRF, fuzzing, and more.

Scanning

Scanning

Nmap and vulnerability scanning workflows.

Start Here

Use these sections to browse by type and keep your notes structured.

Labs

Hands-on environments, recon flows, and exploitation paths.

CTF

Challenge writeups, flags, and quick references.

Projects

Tools, automation, and research notes.

Pentest Notes

Techniques, commands, and screenshots from real practice.