Writeups | Tips & Tricks | Checklists | Resources

This blog serves as my personal knowledge base and documentation platform. Here, I share CTF writeups, practical tips, methodologies, checklists, and other cybersecurity-related content that I use in my learning and work.
Writeups
Detailed walkthroughs and methodologies for solving vulnerable machines and CTF challenges.
Explore : Writeups 🔗
Resources
A collection of tools, scripts, mindmaps, and references I use or recommend.
Explore : Resources 🔗
Tips & Tricks
Quick notes, commands, and techniques that help with pentesting, automation, and workflow efficiency.
Explore : Cheetsheets 🔗
Checklists
Practical checklists for various phases of an engagement—reconnaissance, privilege escalation, post-exploitation, and reporting.
Coming soon…
Maintained by Heshan Perera — documenting the path of a hacker, one post at a time.